lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <web-77676627@bk1.webmaillogin.com>
Date: Fri, 13 Jul 2007 09:26:17 -0400
From: <edi.strosar@...nostne-novice.com>
To: full-disclosure@...ts.grok.org.uk
Subject: PIRS2007 local buffer overflow vulnerability
TeamIntell discovered local buffer overflow vulnerability
in PIRS2007 (data collection of companies and active
business subjects in Slovenia). Please see the attached
security advisory for details.
Vendor has released a patch that solves this issue.
Download link:
http://www.pirs.si/slo/index.php?dep_id=29&help_id=60
Edi Strosar
(TeamIntell)
Download attachment "TISA2007-03-Public.pdf" of type "application/pdf" (26353 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/