Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 6 Jul 2015 09:17:21 +0200
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: Out-of-bounds read in wget and curl using CVE-2015-2059

Hello!

As you probably know, CVE-2015-2059 was't fixed yet
(https://bugzilla.redhat.com/show_bug.cgi?id=1197796). Unfortunately
many applications are using libidn without validating its UTF-8
inputs. Recently wget
(http://git.savannah.gnu.org/cgit/wget.git/commit/?id=77f5a27e6506970c00b96570b6783c49582eacd7)
and curl (http://curl.haxx.se/mail/lib-2015-06/0143.html) applied some
mitigations.

After reading the previous oss-security related threads i'm still
unsure if these issues deserve individual CVEs or they are just
consequences of CVE-2015-2059.
A quick and dirty demo of this memory leak is available here:
https://gist.github.com/neuromancer/cfba1dae769db0551963

Regards,
Gustavo.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ