Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <200804110144.53058.rbu@gentoo.org>
Date: Fri, 11 Apr 2008 01:44:52 +0200
From: Robert Buchholz <rbu@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: openfire <3.5.0 Denial of Service

Please assign a CVE identifier:

Openfire (formerly wildfire) before 3.5.0 is prone to a Denial of 
Service vulnerability. It cannot handle clients that fail to read 
messages, and has no limit on their session's send buffer.

Secunia:
  http://secunia.com/advisories/29751/
Upstream bug:
  http://www.igniterealtime.org/issues/browse/JM-1289
Commit:
  http://www.igniterealtime.org/fisheye/changelog/svn-org?cs=10031


Download attachment "signature.asc " of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.