|
Message-Id: <00F23841-9165-4690-AE0B-6EA70F6EA15A@nginx.com> Date: Fri, 26 Apr 2013 11:15:21 +0400 From: Andrew Alexeev <andrew@...nx.com> To: oss-security@...ts.openwall.com Cc: kseifried@...hat.com, gremlin@...mlin.ru Subject: Re: Nginx ngx_http_close_connection function integer overflow - can anyone confirm this? On Apr 26, 2013, at 9:48 AM, Alistair Crooks wrote: > On Thu, Apr 25, 2013 at 11:36:17PM -0600, Kurt Seifried wrote: >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> - From Bugtraq: >> >> http://www.securityfocus.com/archive/1/526439/30/0/threaded >> >> Website: http://safe3.com.cn > > Is this legit? > > I downloaded the index.html file with curl, and embedded around line 87 > was a flash file: Unfortunately we weren't approached by "Qihoo 360 Web Security Research Team" before this publication went out through bugtraq. We are now trying to obtain more information from that team without much success. We've also analyzed their report and we can't conclude this is a real vulnerability yet. From the descriptions provided it still looks like it's somewhat spurious. We are trying to continue investigation though. Regrettably responsible disclosure isn't always the case. However, we can't yet confirm it's a full one either. > <table width="930" border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF"> > <tr><td> > <object type="application/x-shockwave-flash" data="/banner.swf?xml=/banner.xml" width="930" height="180"> > <param name="movie" value="/banner.swf?xml=/banner.xml"/> > </object> > </td></tr> > <tr> > > so I took it to be an attempt at phishing. > > Maybe I'm just too paranoid in my old age? > > Regards, > Alistair >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.