Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 04 Aug 2012 12:58:41 -0400
From: Jeff Mitchell <mitchell@....org>
To: oss-security@...ts.openwall.com
CC: Agostino Sarubbo <ago@...too.org>
Subject: Re: CVE request for Calligra

On 08/04/2012 11:56 AM, Agostino Sarubbo wrote:
> On Saturday 04 August 2012 11:44:33 Jeff Mitchell wrote:
>> I don't know what Kurt wants, as he didn't respond to my email.
>>
>> What information do you want?
> Take a look here, an example of CVE description: 
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2677
> 
> Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in 
> Boost Pool before 3.9 makes it easier for context-dependent attackers to 
> perform memory-related attacks such as buffer overflows via a large size 
> value, which causes less memory to be allocated than expected.
> 
> So, in this case, if you don't provide to any info, what Kurt should write?
>  
>> What commit code do you want?
> Please post the diff between the vulnerable code and the fix so we are sure 
> that is a security issue.
> 

Hi,

You can read all about the details of the vulnerability in the Black Hat
2012 presentation by Charlie Miller
(http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf)
-- details of the Calligra (and KOffice) exploit start at page 39.

Unfortunately, he did not notify us ahead of time of his intent to
disclose, so it's already public.

Thanks,
Jeff


Download attachment "signature.asc" of type "application/pgp-signature" (263 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.