lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20080604212446.34bb1f55.aluigi@autistici.org> Date: Wed, 4 Jun 2008 21:24:46 +0100 From: Luigi Auriemma <aluigi@...istici.org> To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk, cert@...t.org Subject: Re: ZDI-08-034: HP StorageWorks Storage Mirroring Authentication Processing Stack Overflow Vulnerability > During the handling of an encoded authentication request, the process > copies the user-supplied login information into a fixed length stack > buffer This one seems exactly the same vulnerability I disclosed in February 2008 and for which I wrote also a testing attack (number 7) in my doubletakedown proof-of-concept: http://aluigi.org/adv/doubletakedown-adv.txt Anyway it's an old version of Double-Take so should be not considered, in fact I mentioned that old bug in my advisory only for thoroughness but without the minimal consideration since the bug was already found and patched by the same vendor (Double-Take, not HP). --- Luigi Auriemma http://aluigi.org _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists