Follow us on Twitter or via RSS feeds with tweets or complete announcement texts or excerpts
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Jan 2011 11:25:21 +0100
From: Salvo Tomaselli <tiposchi@...cali.it>
To: oss-security@...ts.openwall.com
Subject: request CVE for weborf

Greetings,

i am requesting a CVE for weborf http://galileo.dmi.unict.it/wiki/weborf/

weborf 0.12.5 fixes a DoS occurring with malformed fields in HTTP request.

Diff from previous version 0.12.4:

$ diff 0.12.4/utils.c 0.12.5/utils.c 
270a271,272
>     val += param_len + 2; //Moves the begin of the string to exclude the 
name of the field
> 
276d277
<     val += param_len + 2; //Moves the begin of the string to exclude the 
name of the field

Regards
-- 
Salvo Tomaselli

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ