|
Message-ID: <Pine.GSO.4.51.0902031705210.3146@faron.mitre.org> Date: Tue, 3 Feb 2009 17:05:26 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security <oss-security@...ts.openwall.com> Subject: Re: CVE request: Tor <0.2.0.33 Heap corruption ====================================================== Name: CVE-2009-0414 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0414 Reference: MLIST:[or-announce] 20090122 Tor 0.2.0.33 is released Reference: URL:http://archives.seul.org/or/announce/Jan-2009/msg00000.html Reference: CONFIRM:http://blog.torproject.org/blog/tor-0.2.0.33-stable-released Reference: BID:33399 Reference: URL:http://www.securityfocus.com/bid/33399 Reference: SECUNIA:33635 Reference: URL:http://secunia.com/advisories/33635 Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.