Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20150603204201.24578B2E078@smtpvbsrv1.mitre.org>
Date: Wed,  3 Jun 2015 16:42:01 -0400 (EDT)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Stack out of bounds read access in uudecode / sharutils

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> What I can say is that many very similar issues I reported in the past
> got CVEs (lately e.g. in wireshark and curl).

What makes uudecode different is that the discovery was an
out-of-bounds read, and uudecode is neither a library nor a
multiple-input program. (Wireshark is a multiple-input program in the
sense that it is commonly used for live packet capture, and must
remain running to capture packets that are sent later. Some other
programs are multiple-input programs because they maintain the state
of multiple sessions.)

In these situations (i.e., OOB-read library=no multiple-input=no),
obtaining a CVE ID currently requires a realistic scenario with a
security impact. One class of scenarios, as mentioned, is data
exfiltration. Another possible class of scenarios involves a read
operation that triggers a change to the program's control flow.

We're not sure that it would be worthwhile to try to document (in
advance) all possible combinations of product attributes and issue
categories, in order to suggest which combinations need more impact
analysis than others.

Also, we realize that some oss-security readers may be very interested
in crash reports that ultimately cannot have CVE IDs. For example,
these reports may help to suggest a specific type of code-quality
problem in a named product, and that information could be quite useful
in choosing the direction of follow-on research into exploitable
problems in that product.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVb2ZDAAoJEKllVAevmvmsMpcH/0tVA9+rgQ2m+eWeubs/U3rP
NdY1ZvW0BKGy5MjFfA+rR/7BLTVwF6lsoXQctpadyuEeFtb2AwcnUAaFaVyIX+hZ
zba0Rk41R1eo2b3Iu+78AGIz7xMMxgGMtJ7AnGpaXlAmiSrFux3ObGe14CIXSvlU
PTYIWjMTIXdT9gsnfwL0M433+nwwB9eqggeL/HAmCvvk9OFI/zghiZhS0lT9ieu3
823JPxhkV27nCce2aakYacPrNj9SjXQbLm+r6uFfzVqQmiHXp9G5PMxDKEyoZ3gN
325p0DdpLujeRWedZrw6xCBg36R31bQwkSW+3KXVIY4tTiBm06wqUEVL2ob83kE=
=MmOo
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.