Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 17 Feb 2015 10:15:57 +0000
From: Patrick Coleman <blinken@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: vulnerabilities in libcsoap

Hi,

A number of vulnerabilities exist in nanohttp, a lightweight webserver library
included with libcsoap (http://csoap.sourceforge.net). Patches are
provided below against
1.1.0-17.2.

* Remote buffer overflow
If the server is misconfigured, a remote user can trigger a buffer
overflow by requesting a resource of a certain length.
http://patrick.ld.net.au/libcsoap/nanohttp-buffer-1.patch

* Remote null pointer dereference
A remote user can cause a null pointer dereference by sending a
malformed Authorization: header.
http://patrick.ld.net.au/libcsoap/nanohttp-nullp-1.patch

Please let me know if you req

Cheers,

Patrick

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ