oss-sec mailing list archives

Re: CVE Request: nagios Stack based buffer overflow in web interface


From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 08 Jan 2013 12:05:18 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/08/2013 06:00 AM, Sebastian Krahmer wrote:
Hi,

I dont know if this already got a CVE. At least its not mentioned 
in the initial posting:

http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html

 Our bug about this is here:

https://bugzilla.novell.com/show_bug.cgi?id=797237

Can someone assign a CVE?

thx, Sebastian

Please use CVE-2012-6096 for this issue.

Just a heads up: I don't really read full-disclosure for CVE
assignments (the signal to noise ratio is insane, and every time I
email back I get a flood of automated replies). If you want a CVE for
open source from me, posting to oss-sec is the way to go.



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=j/BZ
-----END PGP SIGNATURE-----


Current thread: