lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri Mar 17 15:48:42 2006
From: bigdaddyzeroday at hush.ai (bigdaddyzeroday@...h.ai)
Subject: [ADVISORY] # =Thu Mar 16 21:01:59 EST 2006= #
	Heap Overflow in Ethereal

They should do better by put valid looking CVE and info.  That be 
funny.

On Thu, 16 Mar 2006 18:02:04 -0800 sk3tch@...tch.net, 
UNEXPECTED_DATA_AFTER_ADDRESS@...NTAX-ERROR. wrote:
>[ADVISORY] # =Thu Mar 16 21:01:59 EST 2006= # Heap Overflow in 
>Ethereal
>
>
>
>
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>1. HISTORY
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>20/1/2006 - Vendor Notification.
>16/3/2006 - Public Disclosure.
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>2. CVE INFORMATION
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>The Common Vulnerabilities and Exposures (CVE) project has 
>assigned the name CVE-2006-820356 to this issue
>
>
>
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>CONTACT
>8=====D~~~~~~~~~~~~~~~~~~~~~~~~~~
>sk3tch@...tch.net lolville@...m.la
>1-888-565-9428
>
>CISSP GSAE CEH CSFA GREM SSP-MPA GWAS SSCP 
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ