Date: Thu, 17 Oct 2013 15:18:17 +0400 From: Sergey Popov <pinkbyte@...too.org> To: oss-security@...ts.openwall.com Subject: CVE request: echoping buffer overflow vulnerabilities Echoping 6.0.2 and before contains several buffer overflow vulnerabilities that can lead to execution of arbitrary code on the system or cause the application to crash. Bug report in Gentoo: https://bugs.gentoo.org/show_bug.cgi?id=349569 Some additional info: http://xforce.iss.net/xforce/xfdb/64141 http://secunia.com/advisories/42619/ Issue is fixed in upstream, but no release yet. Please assign a CVE for this, thanks.  - http://sourceforge.net/p/echoping/bugs/55/ -- Best regards, Sergey Popov Gentoo developer Gentoo Desktop Effects project lead Gentoo Qt project lead Gentoo Proxy maintainers project lead Download attachment "signature.asc" of type "application/pgp-signature" (556 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.