Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 19 Sep 2017 20:45:39 -0400
From: Luciano Bello <luciano@...ian.org>
To: hosein.askari@....com
Cc: team@...urity.debian.org, oss-security@...ts.openwall.com
Subject: Re: [CVE-2017-14266] tcprewrite Heap-Based Buffer Overflow

On 09/19/2017 07:40 AM, hosein.askari@....com wrote:
> First of all, I realy appreciate for sen­ding me an email abo­ut the mentioned vul­nerability. I have examined the vulnerab­ility
> again on Ubuntu 16.04 due to your sent email. I have not tri­ed this vulnerability on the distributio­ns that you mentione­d. 
> The screenshot which illustrates differe­nt steps (POC) is se­nt via this email for your kind consider­ations and uploaded on this link:
> https://www.photobox­.co.uk/my/photo/full­?photo_id=9959498468

The link is 404ing. I might be creating the pcap wrongly. Can you make a
input pcap available?

thanks! /luciano

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ