lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060316080148.CCFC41B02@lists.grok.org.uk>
Date: Thu Mar 16 08:25:24 2006
From: ripemd160 at gmail.com (ripemd160@...il.com)
Subject: !ADVISORY! | [Thu Mar 16 03:01:42 EST 2006] | DoS
	Vulnerability in Apple MacOSX




!ADVISORY! | [Thu Mar 16 03:01:42 EST 2006] | DoS Vulnerability in Apple MacOSX




===================================================
1. Background
There had been no identified background information regarding the issue.
===================================================
2. Description
Sending a specially crafted  malformed  packet to the services communication socket can create a loss of service.

===================================================
3. History
22/1/2006 - Vendor Notification.
26/2/2006 - Vendor Reply.
16/3/2006 - Public Disclosure.
===================================================
4. Vendor Response
Apple MacOSX is extended no information.
===================================================
5. CVE Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-912128 to this issue

===================================================
Appendix A Vendor Information
http://www.apple.com/macosx/

===================================================
Appendix B References
RFC 6719

===================================================
Contact
Ripe Md lolville@...m.la
1-888-565-9428

CEH CSFA SSP-CNSA CAP SSCP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ