Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 1 Jul 2009 08:01:51 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: oss-security+ml@...lde.de
Subject: Re: CVE id request: compface


======================================================
Name: CVE-2009-2286
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2286
Reference: MLIST:[oss-security] 20090629 CVE id request: compface
Reference: URL:http://www.openwall.com/lists/oss-security/2009/06/29/2
Reference: MLIST:[oss-security] 20090629 Re: CVE id request: compface
Reference: URL:http://www.openwall.com/lists/oss-security/2009/06/29/4
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534973

Buffer overflow in compface 1.5.2 and earlier allows user-assisted
attackers to cause a denial of service (crash) via a long declaration
in a .xbm file.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.