Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1291524204.1871571278097376467.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Fri, 2 Jul 2010 15:02:56 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Luigi Auriemma <aluigi@...istici.org>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Mumble server (Murmur) / Qt
 SQLite -- Remotely exploitable DoS (murmur termination) due QueryUsers Qt
 SQLite database bug

Please use CVE-2010-2490

Thanks.

-- 
    JB


----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote:

> Hi Steve, vendors,
> 
>    Luigi Auriemma reported:
>    [1] http://aluigi.altervista.org/adv/mumbleed-adv.txt
> 
> a deficiency in the way Mumble server processed malformed SQL query
> data.
> A remote, authenticated user could use this flaw to cause denial of
> service
> (mumble server termination) via specially-crafted QueryUsers Qt SQLite
> SQL
> query.
> 
> References:
>    [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587713
> 
> Public PoC:
>    [3] http://aluigi.org/poc/mumbleed.zip
> 
> Though not sure, if the true reason for this is:
> 1, either Mumble server calling relevant Qt SQLite function in
> improper way or
> 2, deficiency in that particular Qt function itself
> 
> Luigi, could you please clarify on the above?
> 
> Steve, could you allocate a CVE id for this?
> 
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.