Date: Mon, 30 Jun 2008 01:37:00 +0200 From: Robert Buchholz <rbu@...too.org> To: oss-security@...ts.openwall.com Subject: Two remote DoS issues in linuxdcpp Hey, Linux DC++ (linuxdcpp) is a Direct Connect client based on the same client code as DC++, so it is vulnerable to the recently reported  NULL pointer dereference remote DoS via partial file list requests http://secunia.com/advisories/30812/ http://sourceforge.net/project/shownotes.php?release_id=608612&group_id=40287 https://bugs.launchpad.net/dcplusplus/+bug/238333 [Can't view] Patch for linuxdcpp: http://cvs.berlios.de/cgi-bin/viewcvs.cgi/linuxdcpp/linuxdcpp/client/ShareManager.cpp.diff?r1=1.14&r2=1.15&sortby=date  Empty message Remote DoS When an attacker sends an empty message, he can cause the client to abort with "std::out_of_range" in substr(). Patch for linuxdcpp: http://cvs.berlios.de/cgi-bin/viewcvs.cgi/linuxdcpp/linuxdcpp/client/NmdcHub.cpp.diff?r1=1.14&r2=1.15&sortby=date Robert Download attachment "signature.asc " of type "application/pgp-signature" (836 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.