|
Message-Id: <201212101858.qBAIwoHM006220@linus.mitre.org> Date: Mon, 10 Dec 2012 13:58:50 -0500 (EST) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: CVE-2012-6302 Soapbox 0.3.1 sandbox bypass -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 We have assigned CVE-2012-6302 to this issue involving running a second instance of Soapbox within a sandboxed Soapbox process: Disclosure: http://dl.packetstormsecurity.net/1210-exploits/soapbox-exec.txt Product source: http://dag.wieers.com/home-made/soapbox/soapbox-0.3.1.tar.bz2 (apparently last updated in 2003) - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (SunOS) iQEcBAEBAgAGBQJQxi9RAAoJEGvefgSNfHMdedoH/0d7uUlBLYR/ZfHKCIRifbyL sRmP0Gj9PeSav15BONfdlMTjs2qQb53Nj2unkB7gkOKQ5nWkVaJbD36fI/rJqAfx 1YzX0Wh3SSa0rxtaHMQKJMix9PD3fOcs23QvmFbwBByO2BKY8WGsg7xfwVwnsuFE vtL6pPUDKdIauZKqFzwUFNKCSedygeaZLb4StoXblAYWxDc0twCnmiepZcvoAW6J ELhym2fazt1HvTqJcVB2uC50U6fTsI52WJCalU1mcvzwZ3LWEJjc1xlgG2eNTkvW 74IbyNy1zuWkMa/JnQSrh3URVnJXTX1KuEoHaiVbDwA3PNVvN1Q79Wh7gjwW13s= =914Q -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.