[go: up one dir, main page]

oss-sec mailing list archives

Re: CVE request: jhead


From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 15 Oct 2008 14:34:45 -0400 (EDT)


Here's the current writeup for CVE-2008-4575.

Jamie and John - don't feel forced to publish more specific details, just
knowing the bug types (and whether upstream fixed *all* the overflows in
2.84, or just some) is enough.

- Steve

======================================================
Name: CVE-2008-4575
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575
Reference: MLIST:[oss-security] 20081015 Re: CVE request: jhead
Reference: URL:http://www.openwall.com/lists/oss-security/2008/10/15/6
Reference: CONFIRM:http://www.sentex.net/~mwandel/jhead/changes.txt
Reference: CONFIRM:https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020

Buffer overflow in the DoCommand function in jhead before 2.84 might
allow context-dependent attackers to cause a denial of service (crash)
via (1) a long -cmd argument and (2) possibly other unspecified
vectors.



Current thread: