Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 28 Jan 2013 14:23:32 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Salvatore Bonaccorso <carnil@...ian.org>, team@...urity.debian.org
Subject: Re: CVE Request: zoneminder: arbitrary command execution
 vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/24/2013 11:47 PM, Salvatore Bonaccorso wrote:
> Hi
> 
> The following arbitrary command execution vulnerability for
> zoneminder was disclosed/published:
> 
> http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/
>
>  Could you please assign a CVE for it?
> 
> Regards, Salvatore

Please use CVE-2013-0232 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=Gs8T
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ