Date: Mon, 19 Apr 2010 17:19:18 +0200 From: Florian Weimer <fw@...eb.enyo.de> To: oss-security@...ts.openwall.com Subject: Re: CVE request: fetchmail 4.6.3...6.3.16 DoS in -v -v mode in multibyte locales on invalid input * Matthias Andree: > Type: malloc() Buffer overrun with printable characters Is this the right summary? It sounds like a heap buffer overflow, but based on the description, I think it's just an infinite loop allocating lots of memory.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.