lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 30 Apr 2006 01:56:10 +0100 From: Tim Brown <timb@...nvas.org> To: bugtraq@...urityfocus.com Cc: openvas-development@...nvas.org Subject: Re: NASL 'Split' function Buffer overflow Vulnerability On Tuesday 25 April 2006 08:51, OS2A BTO wrote: > We have discovered a vulnerability in libnasl of Nessus which can > cause Denial of > Service. We have attached the advisory which details the vulnerability and > also has the fix. A patch for libnasl 2.2.4 is included. OpenVAS CVS HEAD was also vulnerable to this DoS condition. Many thanks to Jayesh and OS2A Team for the patch, this has now been committed. Tim -- Tim Brown, OpenVAS <mailto:timb@...nvas.org> <http://www.openvas.org/>
Powered by blists - more mailing lists