Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201312120509.rBC591s7026591@linus.mitre.org>
Date: Thu, 12 Dec 2013 00:09:01 -0500 (EST)
From: cve-assign@...re.org
To: jurriaanbremer@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: ZNC IRC Bouncer DoS in FiSH Plugin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>no bounds are checked, and thus the buffer "raw_buf" can be overflowed

Use CVE-2013-7049.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSqUS5AAoJEKllVAevmvmsFP8H/2nnWV/ZvMeRPco9M7N5YcrL
gBL2I1hXcL3nh+NblNaEnP+mCdM3Q5zNgiStLtyjE39slCZoElyIbQSnSn2BjWAw
NE29+PcpKnOqgfu7SjS5HePF+U/f788ksQdizoCtQ3lRcWzaGWj3gv/es7pPg4Dg
W1HbB9Gmp8SvOkt0DAeFBK93eC+QOw/HGRnQeM32ScGLg0Qac9dCwbGIG3AM5bV9
1v73xWv1XnU41LPbwir/eGPdiGNGC4vtjsABEL9CJzw4v5frPnLjznySc2rOCGqq
+sOUGZKUXpJox/lXmCzkD2MAVuK8vKIAyGXMZGkode3Hvu2VhVr1/l8BK2TwYw8=
=moi9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.