|
Message-ID: <Pine.GSO.4.51.0811202116470.20524@faron.mitre.org> Date: Thu, 20 Nov 2008 21:16:54 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: Jan Lieskovsky <jlieskov@...hat.com> cc: "Steven M. Christey" <coley@...re.org>, oss-security@...ts.openwall.com Subject: Re: CVE Request -- OptiPNG ====================================================== Name: CVE-2008-5101 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101 Reference: MLIST:[oss-security] 20081112 CVE Request -- OptiPNG Reference: URL:http://openwall.com/lists/oss-security/2008/11/12/1 Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505399 Reference: CONFIRM:http://optipng.sourceforge.net/ Reference: CONFIRM:http://prdownloads.sourceforge.net/optipng/optipng-0.6.1.1.diff?download Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=639631&group_id=151404 Reference: FRSIRT:ADV-2008-3108 Reference: URL:http://www.frsirt.com/english/advisories/2008/3108 Reference: SECUNIA:32651 Reference: URL:http://secunia.com/advisories/32651 Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow."
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.