lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060317020151.72DDBA6FF@lists.grok.org.uk>
Date: Fri Mar 17 02:13:35 2006
From: famato at infobyte.com.ar (famato@...obyte.com.ar)
Subject: -advisory- # =Thu Mar 16 21:01:47 EST 2006= #
	Buffer Overflow in Apple iTunes




-advisory- # =Thu Mar 16 21:01:47 EST 2006= # Buffer Overflow in Apple iTunes




8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8===D BACKGROUND
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This problem had no background.
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8===D HISTORY
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
29/1/2006 8==D Vendor Notification.
16/3/2006 8==D Public Disclosure.
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8===D WORKAROUND
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
There was no workarounds for this problem in question.
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8===D VENDOR RESPONSE
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Apple iTunes has presented no identified information regarding the problem indentified.
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8===D CVE INFORMATION
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-684179 to this issue



8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CONTACT
8=======================D~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
famato@...obyte.com.ar famato@...obyte.com.ar

CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS SSCP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ