Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 27 Jan 2015 09:20:21 -0800
From: Michal Zalewski <lcamtuf@...edump.cx>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Re: Qualys Security Advisory CVE-2015-0235 - GHOST:
 glibc gethostbyname buffer overflow

Nice work - thanks for the thoroughly investigated and detailed advisory.

Given the constraints, I'm assuming that Exim was the only obviously
remotely exploitable case that you were able to identify? I'd imagine
that you investigated OpenSSH, Apache, other SMTP agents, etc? Would
you be willing to publish the list of the reviewed implementations to
reduce the amount of repeated work?

/mz

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.