lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu Mar 16 20:34:54 2006
From: eslerj at gmail.com (Joel Esler)
Subject: -Advisory- + =Thu Mar 16 14:18:44 EST 2006= +
	Off-by-one in AOL Client Software




-Advisory- + =Thu Mar 16 14:18:44 EST 2006= + Off-by-one in AOL Client Software




++++++++++++++++++++++++++++++++++++++++++
I. BACKGROUND
++++++++++++++++++++++++++++++++++++++++++
There was no background information about the issue at hand.
++++++++++++++++++++++++++++++++++++++++++
II. DESCRIPTION
++++++++++++++++++++++++++++++++++++++++++
It is possible to make AOL Client Software crash by the use of malformed input.

++++++++++++++++++++++++++++++++++++++++++
III. VENDOR RESPONSE
++++++++++++++++++++++++++++++++++++++++++
AOL Client Software is presented no identified explanation about this vulnerability at hand.
++++++++++++++++++++++++++++++++++++++++++
IV. CVE INFORMATION
++++++++++++++++++++++++++++++++++++++++++
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-602444 to this issue

++++++++++++++++++++++++++++++++++++++++++
APPENDIX A VENDOR INFORMATION
++++++++++++++++++++++++++++++++++++++++++
http://www.aol.com

++++++++++++++++++++++++++++++++++++++++++
APPENDIX B REFERENCES
++++++++++++++++++++++++++++++++++++++++++
RFC 2670

++++++++++++++++++++++++++++++++++++++++++
CONTACT
++++++++++++++++++++++++++++++++++++++++++
Joel Esler eslerj@...il.com

CCE SSP-CNSA SSP-MPA GIPS GWAS CAP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ