Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 20 Nov 2008 20:27:25 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: toots@...tageeks.org
Subject: Re: CVE id request: another geshi issue (was:
 GeSHi: Clarification about the recent security (non-)issues
 (SA32559))


======================================================
Name: CVE-2008-5185
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5185
Reference: MLIST:[oss-security] 20081120 CVE id request: another geshi issue (was: [oss-security] GeSHi: Clarification about the recent security (non-)issues (SA32559))
Reference: URL:http://www.openwall.com/lists/oss-security/2008/11/20/4
Reference: CONFIRM:http://geshi.svn.sourceforge.net/viewvc/geshi/trunk/geshi-1.0.X/src/geshi.php?r1=1321&r2=1322&view=patch

The highlighting functionality in geshi.php in GeSHi before 1.0.8 allows
remote attackers to cause a denial of service (infinite loop) via an XML
sequence containing an opening delimiter without a closing delimiter, as
demonstrated using "<".


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.