lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060317015902.35E845DDD@lists.grok.org.uk> Date: Fri Mar 17 02:18:08 2006 From: smaillist at gmail.com (Sowhat .) Subject: Advisory $ =Thu Mar 16 20:58:58 EST 2006= $ Buffer Overflow in Dantz Retrospect Advisory $ =Thu Mar 16 20:58:58 EST 2006= $ Buffer Overflow in Dantz Retrospect --------------- o/ 卍 BACKGROUND This problem has no background commentary about the issue in question. --------------- 卍 \o DESCRIPTION It is possible to make Dantz Retrospect crash or run arbitrary code by the use of malformed input. --------------- o/ 卍 HISTORY 2/17/2006 o/ Vendor Notification. 1/0/2006 o/ Vendor Reply. 3/16/2006 o/ Public Disclosure. --------------- 卍 \o VENDOR RESPONSE Dantz Retrospect has extended no identified explanation. --------------- o/ 卍 CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-589807 to this issue --------------- APPENDIX A VENDOR INFORMATION http://www.dantz.com --------------- APPENDIX B REFERENCES RFC 8617