lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <158830271.20041104185439@SECURITY.NNOV.RU>
From: 3APA3A at SECURITY.NNOV.RU (3APA3A)
Subject: The Bat! libpng bo?

Dear full-disclosure@...ts.netsys.com,

  It  looks  like  The  Bat!  uses  libpng  1.0.5  and zlib 1.1.3 and is
  vulnerable  to very old buffer overflow and double free bugs. At least
  it catches exception on http://www.security.nnov.ru/files/libpngbo.png
  and  thread  is  silently closed... There is no any visual effect, but
  you can see it in debugger. The rest of The Bat! is written in Delphi.

  Can  anyone  confirm  if  this  is  exploitable  (I know nothing about
  Borland compilers)?

-- 
http://www.security.nnov.ru
         /\_/\
        { , . }     |\
+--oQQo->{ ^ }<-----+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
                    |/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ