Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080804122102.39a4c011@redhat.com>
Date: Mon, 4 Aug 2008 12:21:02 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: thijs@...ian.org, coley@...re.org
Subject: Re: CVE request: httrack buffer overflow

On Mon, 4 Aug 2008 11:42:15 +0200 Thijs Kinkhorst <thijs@...ian.org>
wrote:

> Please see:
> http://www.frsirt.com/english/advisories/2008/2221
> http://www.debian.org/security/2008/dsa-1626
> 
> Could we get a CVE name assigned to that please?

CVE-2008-3429 ?

Buffer overflow in URI processing in HTTrack and WinHTTrack before
3.42-3 allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a long URL.

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3429

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.