Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 20 Apr 2010 10:08:41 +0200
From: "Matthias Andree" <matthias.andree@....de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: fetchmail 4.6.3...6.3.16 DoS in -v -v
 mode in multibyte locales on invalid input

Am 19.04.2010, 17:19 Uhr, schrieb Florian Weimer:

> * Matthias Andree:
>
>> Type:		malloc() Buffer overrun with printable characters
>
> Is this the right summary?  It sounds like a heap buffer overflow, but
> based on the description, I think it's just an infinite loop
> allocating lots of memory.

That's why it's a "draft". Thanks.

-- 
Matthias Andree

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.