Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 7 Sep 2010 14:44:36 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Bip -- Remote Dos (crash) by
 exchanging user credentials

Please use CVE-2010-3071

Thanks.

-- 
    JB


----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote:

> Hello Steve, vendors,
> 
>    A denial of service flaw was found in the way Bip IRC Bouncer
> exchanged user credentials by initiating the IRC protocol session.
> A remote, unauthenticated user could send a specially crafted
> connection request, leading to bip daemon crash (NULL pointer
> dereference)
> 
> References:
>    [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595409
>    [2] https://bugzilla.redhat.com/show_bug.cgi?id=630437
> 
> Could you allocate CVE id for this one?
> 
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.