lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316183940.961BB2B0E@lists.grok.org.uk> Date: Thu Mar 16 18:56:13 2006 From: guirad_g at epita.fr (guirad_g@...ta.fr) Subject: Advisory - =Thu Mar 16 13:39:35 EST 2006= - Buffer Overflow in Dantz Retrospect Advisory - =Thu Mar 16 13:39:35 EST 2006= - Buffer Overflow in Dantz Retrospect ------------------------ 1. Description It is possible to make Dantz Retrospect crash or run arbitrary code by the use of malformed input. ------------------------ 2. Vendor Response Dantz Retrospect has offered no information on the problem indentified. ------------------------ 3. CVE Information The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-21362 to this issue ------------------------ Appendix A Vendor Information http://www.dantz.com ------------------------ Appendix B References RFC 5455 ------------------------ Contact ggfirst lolville@...m.la 1-888-565-9428 CISSP GSAE CCE CEH CSFA SSP-CNSA SSP-MPA GIPS GHTQ GWAS CAP SSCP