lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAEt-_r2T75irL+vT6BBtsH_14gUZP-dzUek77cAg9dzk4ZZM2Q@mail.gmail.com> Date: Mon, 28 Oct 2013 08:11:23 +0100 From: Jérôme Nokin <jerome.nokin@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: WatchGuard - CVE-2013-6021 - Bug and exploit details Hello, Details about WatchGuard XTM(v) stack-based buffer overflow, including exploitation are available at: http://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/ References - http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6021 - http://www.kb.cert.org/vuls/id/233990 - http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/ - http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/ Best regards, Jerome _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/