Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Mar 2009 15:52:48 +0200
From: Anthony <tony@...post24.com>
To: oss-security@...ts.openwall.com
Subject: [Fwd: Cross-Site Scripting in Banshee DAAP Extension]

I've notified Redhat and the Novell/SuSE security teams about a
vulnerability in Banshee's DAAP extension. I have requested a CVE name
for this. I will update this list when I have received the actual CVE
name.

Subject: Cross-Site Scripting in Banshee DAAP Extension
From: Anthony <tony@...post24.com>
Reply-To: tony@...post24.com
To: cve@...re.org
Content-Type: text/plain
Organization: Outpost24 AB
Message-Id: <1238405900.3260.32.camel@...ebook>
Mime-Version: 1.0
X-Mailer: Evolution 2.24.5 (2.24.5-1.fc10) 
Date: Mon, 30 Mar 2009 11:38:21 +0200
Content-Transfer-Encoding: 7bit

I would like to reserve a CVE name for a cross-site scripting
vulnerability in the DAAP extension of Banshee. A description of the
vulnerability can be found in the GNOME bugzilla
(http://bugzilla.gnome.org/show_bug.cgi?id=577270).
I have notified the RedHat and SuSE/Novell security teams. I consider
the bugzilla a notification to the upstream vendor (which also happens
to be Novell anyway).
Upstream vendor is aware that I'm requesting this CVE name.

I'm still waiting for RHSA and SUSE-SA numbers. I'll follow up when I
have them.

Thank you in advance,
- Tony


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.