Date: Sat, 9 Jan 2010 13:08:49 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: bressers@...hat.com Subject: Re: CVE request - pidgin MSN arbitrary file upload On Thu, 7 Jan 2010, Nico Golde wrote: > While everyone is talking about the file inclusion vulnerability which is > really important, has anyone investigated the SLP memory corruption issue yet? > Page 24: http://events.ccc.de/congress/2009/Fahrplan/attachments/1483_26c3_ipv4_fuckups.pdf Use CVE-2010-0277 for the memory corruption. - Steve ====================================================== Name: CVE-2010-0277 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277 Reference: MLIST:[oss-security] 20100107 Re: CVE request - pidgin MSN arbitrary file upload Reference: URL:http://www.openwall.com/lists/oss-security/2010/01/07/2 Reference: MISC:http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different issue than CVE-2010-0013.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.