Date: Wed, 3 Dec 2014 15:48:49 +0100 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: Re: CVE request: out-of-bounds memory access flaw in unrtf On Wed, 03 Dec 2014 07:37:54 -0700 "Vincent Danen" <vdanen@...hat.com> wrote: > https://bugzilla.redhat.com/show_bug.cgi?id=1170233 You mixed up Michal and me :-) But appart from that: It's really not a single issue. I just fuzzed one and reported it to check whether there is any reaction. But you easily get dozends if you run afl on it. If you want to fix unrtf there's more to it than that. Basically you'd have to fork it and take over development. Same is true for a whole bunch of other tools (catdoc, antiword, latex2rtf, ...) -- Hanno Böck http://hboeck.de/ mail/jabber: hanno@...eck.de GPG: BBB51E42 Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.