Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201212101858.qBAIwoHM006220@linus.mitre.org>
Date: Mon, 10 Dec 2012 13:58:50 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE-2012-6302 Soapbox 0.3.1 sandbox bypass

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

We have assigned CVE-2012-6302 to this issue involving running a second
instance of Soapbox within a sandboxed Soapbox process:

Disclosure:     http://dl.packetstormsecurity.net/1210-exploits/soapbox-exec.txt
Product source: http://dag.wieers.com/home-made/soapbox/soapbox-0.3.1.tar.bz2
                (apparently last updated in 2003)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJQxi9RAAoJEGvefgSNfHMdedoH/0d7uUlBLYR/ZfHKCIRifbyL
sRmP0Gj9PeSav15BONfdlMTjs2qQb53Nj2unkB7gkOKQ5nWkVaJbD36fI/rJqAfx
1YzX0Wh3SSa0rxtaHMQKJMix9PD3fOcs23QvmFbwBByO2BKY8WGsg7xfwVwnsuFE
vtL6pPUDKdIauZKqFzwUFNKCSedygeaZLb4StoXblAYWxDc0twCnmiepZcvoAW6J
ELhym2fazt1HvTqJcVB2uC50U6fTsI52WJCalU1mcvzwZ3LWEJjc1xlgG2eNTkvW
74IbyNy1zuWkMa/JnQSrh3URVnJXTX1KuEoHaiVbDwA3PNVvN1Q79Wh7gjwW13s=
=914Q
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.