Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1471874796.405861270515680192.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Mon, 5 Apr 2010 21:01:20 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Roshan Kumar Singh <roshansingh@...rs.sourceforge.net>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- OpenDCHub v0.8.1 -- Stack
 overflow by handling a specially-crafted MyINFO message


----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote:

> Hi Steve, vendors
> 
>    (based on http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308)
> 
>    Pierre Nogues found a stack overflow flaw, in the way Open DC Hub
> sanitized content of user's MyINFO message. Remote attacker,
> with valid Open DC Hub account, could send a specially-crafted
> MyINFO message to another user / all users connected to particular
> Direct Connect network, leading into denial of service (opendchub
> crash) or, potentially, to arbitrary code execution with the
> privileges
> of the user running opendchub.
> 
> References:
>    [1]
> http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600
>    [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308
>    [3] https://bugzilla.redhat.com/show_bug.cgi?id=579206
> 

Use CVE-2010-1147

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.