|
Message-ID: <20141203154849.00e6cc66@pc>
Date: Wed, 3 Dec 2014 15:48:49 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: out-of-bounds memory access flaw in
unrtf
On Wed, 03 Dec 2014 07:37:54 -0700
"Vincent Danen" <vdanen@...hat.com> wrote:
> https://bugzilla.redhat.com/show_bug.cgi?id=1170233
You mixed up Michal and me :-)
But appart from that: It's really not a single issue. I just fuzzed one
and reported it to check whether there is any reaction. But you easily
get dozends if you run afl on it.
If you want to fix unrtf there's more to it than that. Basically you'd
have to fork it and take over development. Same is true for a whole
bunch of other tools (catdoc, antiword, latex2rtf, ...)
--
Hanno Böck
http://hboeck.de/
mail/jabber: hanno@...eck.de
GPG: BBB51E42
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.