oss-sec mailing list archives

Re: CVE request: out-of-bounds memory access flaw in unrtf


From: cve-assign () mitre org
Date: Thu, 4 Dec 2014 13:32:17 -0500 (EST)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

An out-of-bounds memory access flaw was reported in unrtf:

https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html
https://bugzilla.redhat.com/show_bug.cgi?id=1170233

Use CVE-2014-9274 for the unrtf issue found by Michal Zalewski:

https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html

Use CVE-2014-9275 for the "additional crashes" as demonstrated by
crashers-unrtf.tar.xz.  The stack traces suggest the same type of
issue in the same location.

https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html

- ---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEVAwUBVICnv6llVAevmvmsAQJI1Af/TAcQIFsv2pbjvQzDwDX+J8pTkuByT9Fz
7CPVfQbwVU8H9tO/Z6z5hM0I0n/lIg9X2taOk+O76LO9RlHimGKlQp7vOPGifQPO
myc5OiYMgQC3IiPoHwezYoVkRLcR57+dkFBCSyh+6n7WPD7zePpuHfBDR2p1lx5Z
XMfeGwble7sNpYy/xlBBO2F5sv+LU8zOuvqjQrHW/G6oE0KMui4fQiQGEk61KSkE
G7UnX5Ixyadp2Q6KQ/qeMYemxlixNOy3tTBK10CBcgJDRRytRgj+bU53xg40ZpZp
QbPtUl/HZHstqMa4wCzHWXGjl/78Dce/0sYiPnX1EUQsSY1jIgcBSQ==
=zsmM
-----END PGP SIGNATURE-----


Current thread: