Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1183300013.2451741284493013759.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Tue, 14 Sep 2010 15:36:53 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: owasp-dotnet@...ts.owasp.org, coley <coley@...re.org>
Subject: Re: CVE request: padding oracle attack: ruby on
 rails 2.3, owasp esapi

I've assgiend two. The details are quite vague unfortunately.

CVE-2010-3299 padding oracle attack: ruby on rails 2.3
CVE-2010-3300 padding oracle attack: owasp esapi

Thanks.

-- 
    JB


----- "Thomas Biege" <thomas@...e.de> wrote:

> Hi,
> the paper [1], about practical padding oracle attacks
> mentions some programming frameworks as vulnerable (section 5):
> - Ruby On ails 2.3
> - OWASP ESAPI
> 
> I think they both need a CVE-ID. Thanks.
> 
> Cheers
> Thomas
> 
> [1] http://usenix.org/events/woot10/tech/full_papers/Rizzo.pdf
> 
> 
> -- 
>  Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support &
> Auditing
>  SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
> --
>   Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
>                             -- Marie von Ebner-Eschenbach

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.