Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 4 Sep 2008 12:22:07 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: newsbeuter


======================================================
Name: CVE-2008-3907
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3907
Reference: MLIST:[oss-security] 20080901 CVE id request: newsbeuter
Reference: URL:http://www.openwall.com/lists/oss-security/2008/09/01/4
Reference: CONFIRM:http://www.newsbeuter.org/downloads/CHANGES
Reference: BID:30964
Reference: URL:http://www.securityfocus.com/bid/30964
Reference: SECUNIA:31676
Reference: URL:http://secunia.com/advisories/31676

The open-in-browser command in newsbeuter before 1.1 allows remote
attackers to execute arbitrary commands via shell metacharacters in a
feed URL.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.