Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <493433228.357481255617401534.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Thu, 15 Oct 2009 10:36:41 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: oping allows the disclosure of
 arbitrary file contents


----- "Steve Kemp" <steve@...ve.org.uk> wrote:

> oping is setuid root application and one of the command line arguments
> allows
>  a configuration file to be specified.  This file is read and
> *reported*
>  to the console - Unless the file is lucky enough to look like a list
>  of hostnames.
> 
>   Brief details here:
> 
>         http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548684
> 

I've not found a CVE id for this anywhere, so here goes:

CVE-2009-3614 oping arbitrary local file disclosure

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.