Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 27 Jan 2015 09:20:21 -0800
From: Michal Zalewski <lcamtuf@...edump.cx>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Re: Qualys Security Advisory CVE-2015-0235 - GHOST:
 glibc gethostbyname buffer overflow

Nice work - thanks for the thoroughly investigated and detailed advisory.

Given the constraints, I'm assuming that Exim was the only obviously
remotely exploitable case that you were able to identify? I'd imagine
that you investigated OpenSSH, Apache, other SMTP agents, etc? Would
you be willing to publish the list of the reviewed implementations to
reduce the amount of repeated work?

/mz

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ