Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E12725C.2000100@redhat.com>
Date: Tue, 05 Jul 2011 10:09:32 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Solar Designer <solar@...nwall.com>
Subject: Re: vsftpd download backdoored

On 07/05/2011 01:25 AM, Solar Designer wrote:
> On Mon, Jul 04, 2011 at 06:56:57PM +0200, Moritz Muehlenhoff wrote:
>> IIRC for such backdoored downloads CVE IDs were assigned in the past
>> to properly track the status of distributions providing the affected 
>> piece of code.
> 
> I suspect that no distributions provide the affected code this time.
> So if affected distributions is the only reason for CVE ID assignment in
> this case, it might make sense to postpone CVE ID allocation until we
> learn of an affected distribution (which we probably won't).

I did not verify.

(09:55:37 AM) hdmoore: The timestamp on vsftpd-2.3.4.tar.gz
http://bit.ly/j4VC5y indicates that the backdoor was present from Feb
15th -> July 3rd (via mc)

Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.