|
Message-ID: <87fwjg7a8r.fsf@mid.deneb.enyo.de> Date: Wed, 28 Sep 2011 21:11:32 +0200 From: Florian Weimer <fw@...eb.enyo.de> To: oss-security@...ts.openwall.com Subject: Re: LZW decompression issues * Tomas Hoger: > Following bugzillas list various code bases that were checked for the > issue and if they are affected or not: > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2895 > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2896 Not good. 8-( Looking at <http://minnie.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/usr.bin/compress/compress.c>, it seems that these constants | char_type lmask[9] = {0xff, 0xfe, 0xfc, 0xf8, 0xf0, 0xe0, 0xc0, 0x80, 0x00}; | char_type rmask[9] = {0x00, 0x01, 0x03, 0x07, 0x0f, 0x1f, 0x3f, 0x7f, 0xff}; can be used to build signatures to spot candidate binaries.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.