Date: Sat, 03 Apr 2010 11:23:40 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Roshan Kumar Singh <roshansingh@...rs.sourceforge.net> Subject: CVE Request -- OpenDCHub v0.8.1 -- Stack overflow by handling a specially-crafted MyINFO message Hi Steve, vendors (based on http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308) Pierre Nogues found a stack overflow flaw, in the way Open DC Hub sanitized content of user's MyINFO message. Remote attacker, with valid Open DC Hub account, could send a specially-crafted MyINFO message to another user / all users connected to particular Direct Connect network, leading into denial of service (opendchub crash) or, potentially, to arbitrary code execution with the privileges of the user running opendchub. References:  http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308  https://bugzilla.redhat.com/show_bug.cgi?id=579206 Could you allocate a CVE id for this? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ