Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4ECCD621.6010309@redhat.com>
Date: Wed, 23 Nov 2011 12:16:49 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com
Subject: CVE Request --  1) Namazu v2.0.21: XSS flaw by processing HTTP cookies
 2) Namazu v2.0.20: Stack-based buffer overflow by replacing blank "uri" field
 value

Hello Kurt, Steve, vendors,

   based on:
   [1] https://bugs.gentoo.org/show_bug.cgi?id=391259
   [2] http://www.namazu.org/security.html.en

the following two issues (when compared against [3]) doesn't
seem to have CVE ids yet:
I) There is cross-site scripting vulnerability for IE 6,7 in version 
2.0.20 or older.

    References:
    http://www.namazu.org/#stable
    http://www.namazu.org/security.html#cross-site-scripting

    Further issue details are described in:
    https://bugzilla.redhat.com/show_bug.cgi?id=756348

    Note: A CVE-2011-* identifier should be assigned for this.
    =====

II) To 2.0.19 or a version that is older than 2.0.19, there is a 
vulnerability of overrunning in the buffer. It recommends since Namazu 
2.0.20 to be used.

    References:
    http://www.namazu.org/#stable
    http://www.namazu.org/security.html.en

    Further issue details are described in:
    https://bugzilla.redhat.com/show_bug.cgi?id=756341

    Note: A CVE-2009-* identifier should be assigned to this.
    =====

Could you allocate two CVE ids (one CVE-2011-*, the other CVE-2009-*)
for these two flaws?

According to:
[3] http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=namazu

the last CVE id, assigned for Namazu, was CVE-2008-1468 for the
"XSS UTF-7" issue, which corresponds to:

"To 2.0.17 or a version that is older than 2.0.17 There is a weakness of 
retrieval type by the misidentification of the encode automatic 
operation recognition of Web browser that is the UTF-7 encoding. It 
recommends since 2.0.18 as much as possible to be used." record
from [2].

Should you need any further details due these two, let me know.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.