Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Apr 2014 13:36:35 +0200
From: ┼╣micier Januszkiewicz <>
Subject: libmms heap-based buffer overflow fix

Hello list,

It seems libmms has fixed a buffer overflow in a recent 0.6.4 version
with the following commit.

This may be triggered via an overly long line of a MMSH (MMS over
HTTP) server response, effectively overflowing the buffer which has a
static size (defined as BUF_SIZE, didn't check the actual numeric

Please assign a CVE name for this, if there is none.

Kind regards,

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ