|
Message-ID: <1471874796.405861270515680192.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com> Date: Mon, 5 Apr 2010 21:01:20 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: Roshan Kumar Singh <roshansingh@...rs.sourceforge.net>, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- OpenDCHub v0.8.1 -- Stack overflow by handling a specially-crafted MyINFO message ----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote: > Hi Steve, vendors > > (based on http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308) > > Pierre Nogues found a stack overflow flaw, in the way Open DC Hub > sanitized content of user's MyINFO message. Remote attacker, > with valid Open DC Hub account, could send a specially-crafted > MyINFO message to another user / all users connected to particular > Direct Connect network, leading into denial of service (opendchub > crash) or, potentially, to arbitrary code execution with the > privileges > of the user running opendchub. > > References: > [1] > http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600 > [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308 > [3] https://bugzilla.redhat.com/show_bug.cgi?id=579206 > Use CVE-2010-1147 Thanks. -- JB
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.