| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316080859.D19321E57@lists.grok.org.uk>
Date: Thu Mar 16 08:22:15 2006
From: waldoalvarez00 at gmail.com (waldoalvarez00@...il.com)
Subject: !ADVISORY! # -Thu Mar 16 03:08:48 EST 2006- #
Heap Overflow in ISC NTP
!ADVISORY! # -Thu Mar 16 03:08:48 EST 2006- # Heap Overflow in ISC NTP
----------------------------------
1. Description
It is possible to make ISC NTP crash or run arbitrary code by the use of malformed input.
----------------------------------
2. History
27-1-2006 - Vendor Notification.
22-2-2006 - Vendor Reply.
16-3-2006 - Public Disclosure.
----------------------------------
3. CVE Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-675200 to this issue
----------------------------------
Appendix A Vendor Information
http://www.isc.org/index.pl?/sw/ntp/
----------------------------------
Appendix B References
RFC 7559
----------------------------------
Contact
waldo alvarez lolville@...m.la
1-888-565-9428
BEWARE THE JIZZTAPO!!!
..
_ .' `.
/\)
/ /
/ / /\
\ \ / \
_ \ \/ /\ \
(/\ \ / \ \
\ \ / \ (Y )
\ \/ /\ \ ""
\ / \ \
\/ / /
/ /
( Y)
""
GSAE CCE SSP-CNSA GIPS GHTQ SSCP