Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 4 Aug 2008 12:38:13 +0200
From: Thijs Kinkhorst <thijs@...ian.org>
To: oss-security@...ts.openwall.com
Cc: coley@...re.org
Subject: Re: CVE request: httrack buffer overflow

On Monday 4 August 2008 12:21, Tomas Hoger wrote:
> CVE-2008-3429 ?
>
> Buffer overflow in URI processing in HTTrack and WinHTTrack before
> 3.42-3 allows remote attackers to cause a denial of service (crash) and
> possibly execute arbitrary code via a long URL.
>
> http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3429

Thanks! I somehow missed that one...


Thijs

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.