lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070512025811.7670.qmail@securityfocus.com> Date: 12 May 2007 02:58:11 -0000 From: vulnpost-remove@...n.sg To: bugtraq@...urityfocus.com Subject: [vuln.sg] yEnc32 Decoder Long Filename Buffer Overflow Vulnerability [vuln.sg] Vulnerability Research Advisory yEnc32 Decoder Long Filename Buffer Overflow Vulnerability by Tan Chew Keong Release Date: 2007-05-12 Summary ------- A vulnerability has been found in yEnc32. When exploited, the vulnerability allows execution of arbitrary code when the user decodes a specially crafted yEnc encoded file. Tested Versions --------------- yEnc32 version 1.0.7.207 Details ------- http://vuln.sg/yenc32-107-en.html http://vuln.sg/yenc32-107-jp.html