Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 19 Apr 2014 12:51:04 +1200
From: Matthew Daley <>
Subject: CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)


I'd like to request a CVE ID for this issue. It was found in software
from GNUstep (, which develop an open-source
development framework and runtime for client and server applications.

This is the first such request and the issue is (now) public; this
message serves as an advisory as well.

Affected software: gdomap (GNUstep Distributed Objects nameserver)
Description: After receiving a crafted invalid request, gdomap will
attempt to log an error message to the system logger. However, due to
incorrect setup of the logger during server initialization, the logger
and gdomap itself will mess up program state enough that program
execution will be aborted. gdomap listens to all interfaces, allowing
a remote unauthenticated attacker to DOS the nameserver. (Please see
the bug tracker entry for more detailed information.)
Bug tracker:
Affected versions: current releases (GNUstep core package <= 1.24.6)
Release notes:
Reported by: Matthew Daley

Please let me know if you need any further information.


- Matthew Daley

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.