Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 12 Feb 2015 15:47:35 -0500 (EST)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: archmage directory traversal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> please assign a CVE ID for this directory traversal in archmage:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164
> 
> archmage is vulnerable to directory traversal via "../" sequences. As a 
> proof of concept, unpacking the attached CHM file creates a file in 
> /tmp

Use CVE-2015-1589.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU3REQAAoJEKllVAevmvms3b4IALKbsUUNpNbS+B/wKOTln6Wn
777lAP5WnFym0Tv86hp8zOE8AAEhmhWUmkMfIakZ6fC+V8WF2oAiHc3tQks7JKt6
AwyfmcyGJlBNc/ZOpRpeGZ9MfL/igNXf/pEYrt8BF1TroznfW30ZLP4J5CvYod7Z
dhmM0y6LhSAIJkYPlowCC4n7m3DIbmlexuoOhVdG0k89R6TzEXaMEKZvdvchyta2
3S1EMviuGKGTx64ZcIgjLXRys++qtFmfiu4sv+ywOJ1zWLgv0K+pU/f39lOEryyY
pObrvjbyEnwX8/vDIgjPp062VIeVIgEynfugmu28c9UME/gBMVn8+Y1xJtpRQos=
=wCNl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.