Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Mar 2012 10:06:35 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: mwlib < 0.13.5 DoS flaw

Could a CVE be assigned to the following please?

It was reported that mwlib suffered from a flaw that could allow a
remote attacker to perform a denial of service attack on a mwlib
installation by forcing it to parse a specially-crafted #iferror magic
function.  This has been corrected in upstream version 0.13.5.

References:

http://groups.google.com/group/mwlib/browse_thread/thread/c2bd1cee77a8a79?hl=en
http://www.google.com/url?sa=D&q=https://github.com/pediapress/mwlib/pull/10&usg=AFQjCNHgoXQUYFtEj0L8VP5K8Xn_GoTOyw
https://github.com/pediapress/mwlib/commit/aa987c281c10e29f26aa0faa21c04f3bb1167fde
https://bugzilla.redhat.com/show_bug.cgi?id=800064

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.