oss-sec mailing list archives
Re: CVE id request: tmsnc
From: "Steven M. Christey" <coley () linus mitre org>
Date: Mon, 23 Jun 2008 14:27:51 -0400 (EDT)
====================================================== Name: CVE-2008-2828 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2828 Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222 Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX commands containing a large UBX payload length field.
Current thread:
- CVE id request: tmsnc Nico Golde (Jun 20)
- Re: CVE id request: tmsnc Eren Türkay (Jun 20)
- Re: CVE id request: tmsnc Nico Golde (Jun 20)
- Re: CVE id request: tmsnc Steven M. Christey (Jun 23)
- Re: CVE id request: tmsnc Nico Golde (Jun 20)
- Re: CVE id request: tmsnc Eren Türkay (Jun 20)