Date: Sun, 27 Nov 2011 18:51:10 +0000 From: Colin Watson <cjwatson@...ian.org> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org>, Leo Iannacone <l3on@...ntu.com> Subject: Re: CVE Request -- ClearSilver (neo_cgi) -- Format string flaw by processing CGI error messages in Python module On Sun, Nov 27, 2011 at 06:21:15PM +0100, Jan Lieskovsky wrote: > a format string flaw was found in the Python CGI Kit (neo_cgi) > module of ClearSilver, a language-neutral HTML templating system, > processed certain input, leading to Common Gateway Interface (CGI) > script errors. A remote attacker could provide a specially-crafted > input, which once processed by an application, using the Python > language API of ClearSilver neo_cgi module, could lead to that > particular application crash, or, potentially arbitrary code > execution with the privileges of the user running the application. Thanks for responding to this. FWIW, I've attached a copy of the original mail I sent to a couple of security@ addresses about this vulnerability. -- Colin Watson [cjwatson@...ian.org] Content of type "message/rfc822" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.