Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141203154849.00e6cc66@pc>
Date: Wed, 3 Dec 2014 15:48:49 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: out-of-bounds memory access flaw in
 unrtf

On Wed, 03 Dec 2014 07:37:54 -0700
"Vincent Danen" <vdanen@...hat.com> wrote:

> https://bugzilla.redhat.com/show_bug.cgi?id=1170233

You mixed up Michal and me :-)

But appart from that: It's really not a single issue. I just fuzzed one
and reported it to check whether there is any reaction. But you easily
get dozends if you run afl on it.

If you want to fix unrtf there's more to it than that. Basically you'd
have to fork it and take over development. Same is true for a whole
bunch of other tools (catdoc, antiword, latex2rtf, ...)


-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.