lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 27 Aug 2007 20:33:56 +0400 From: 3APA3A <3APA3A@...URITY.NNOV.RU> To: security@...ns.com Cc: full-disclosure@...ts.grok.org.uk, 'BugTraq' <bugtraq@...urityfocus.com> Subject: Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory Dear security@...ns.com, Either Subject "UPX parsing Arbitrary CodeExecution" or vulnerability description "Infinite Loop in UPX packed files parsing" are wrong. Can you provide more detailed information please? It's not clear, how infinite loop can lead to remote code execution. --Friday, August 24, 2007, 11:15:01 PM, you wrote to bugtraq@...urityfocus.com: snc> Description: snc> A remotely exploitable vulnerability has been found in the file parsing snc> engine. snc> In detail, the following flaw was determined: snc> - Infinite Loop in UPX packed files parsing snc> Impact: snc> This problem can lead to remote denial of service or arbitrary code snc> execution if an attacker carefully crafts a file that exploits the snc> aforementioned vulnerability. The vulnerability is present in Sophos snc> Anti-virus software listed above on all platforms supported by the affected snc> products prior to the engine Version 2.48.0. -- ~/ZARAZA http://securityvulns.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists