|
Message-ID: <4ECCD621.6010309@redhat.com> Date: Wed, 23 Nov 2011 12:16:49 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security@...ts.openwall.com Subject: CVE Request -- 1) Namazu v2.0.21: XSS flaw by processing HTTP cookies 2) Namazu v2.0.20: Stack-based buffer overflow by replacing blank "uri" field value Hello Kurt, Steve, vendors, based on: [1] https://bugs.gentoo.org/show_bug.cgi?id=391259 [2] http://www.namazu.org/security.html.en the following two issues (when compared against [3]) doesn't seem to have CVE ids yet: I) There is cross-site scripting vulnerability for IE 6,7 in version 2.0.20 or older. References: http://www.namazu.org/#stable http://www.namazu.org/security.html#cross-site-scripting Further issue details are described in: https://bugzilla.redhat.com/show_bug.cgi?id=756348 Note: A CVE-2011-* identifier should be assigned for this. ===== II) To 2.0.19 or a version that is older than 2.0.19, there is a vulnerability of overrunning in the buffer. It recommends since Namazu 2.0.20 to be used. References: http://www.namazu.org/#stable http://www.namazu.org/security.html.en Further issue details are described in: https://bugzilla.redhat.com/show_bug.cgi?id=756341 Note: A CVE-2009-* identifier should be assigned to this. ===== Could you allocate two CVE ids (one CVE-2011-*, the other CVE-2009-*) for these two flaws? According to: [3] http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=namazu the last CVE id, assigned for Namazu, was CVE-2008-1468 for the "XSS UTF-7" issue, which corresponds to: "To 2.0.17 or a version that is older than 2.0.17 There is a weakness of retrieval type by the misidentification of the encode automatic operation recognition of Web browser that is the UTF-7 encoding. It recommends since 2.0.18 as much as possible to be used." record from [2]. Should you need any further details due these two, let me know. Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.