oss-sec mailing list archives
Re: CVE Request: nagios Stack based buffer overflow in web interface
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 08 Jan 2013 12:05:18 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/08/2013 06:00 AM, Sebastian Krahmer wrote:
Hi, I dont know if this already got a CVE. At least its not mentioned in the initial posting: http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html Our bug about this is here: https://bugzilla.novell.com/show_bug.cgi?id=797237 Can someone assign a CVE? thx, Sebastian
Please use CVE-2012-6096 for this issue. Just a heads up: I don't really read full-disclosure for CVE assignments (the signal to noise ratio is insane, and every time I email back I get a flood of automated replies). If you want a CVE for open source from me, posting to oss-sec is the way to go. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQ7G3uAAoJEBYNRVNeJnmTg/sQAMr15m/ZYGlm+IFF6Q/Ln+sv GBUhM5zksB9dpoSlKlyC9cDimTYnaOILuDBlbizrt04nxiYZp97VsmHVaHn0hpI7 pRfL8N9UoLPJixs5BwSW5tFPU+it0uTFJXirl4ycS0Dfn/kJ5BGZw1lNYVvGWs+M vXGgN/abbmnZ5S9motpl5+JLxH7i4p4QLpp4lYEJSM8T2sLP4umOrtSZgjG24dT+ K6x3XzBcNGQvsWgQRJnEOTKW222rx2zNmQat+JD4XmDvL5cO9I5D/Q9xHLvF1kZB Jb3Uyo637onhja+DpDCKMbz4IVSRTJv0aBmdGuqT9mefIVmbezAJnOiqSmWvEmvv bRAjRvzXs+m6MjoBK8gI7Vk8otSvuIHDcmrvMh1hYVJ0fMpFh6nDLSnmEuJGddQF mYH9cSakGzK7vgKj6624nNlqhDBq/Imbb8yBzH8xPznMENcWbNp/QRs5kvGufedr CoMiX3lkcWEjQei+WhTfKUbkmv5xFOR3PxUoM8kTYAuOHG/1K82KHdMFQlpLcIb8 miaR/H3A1SzKGVCPPWme9kBOlnRYuaekSkbqBYZXBnPfxbCvHZKdJxorw8p6D+0G dyA2UKtNxrB+DZDrxQD66OmTRN5YTp4Mi0wns/YZK+INTuTh69e/SKPn1kqIpZmY uuSIUaDa14lYCFuunCd4 =j/BZ -----END PGP SIGNATURE-----
Current thread:
- CVE Request: nagios Stack based buffer overflow in web interface Sebastian Krahmer (Jan 08)
- Re: CVE Request: nagios Stack based buffer overflow in web interface Kurt Seifried (Jan 08)