Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20140916065630.3E149C50084@smtptsrv1.mitre.org>
Date: Tue, 16 Sep 2014 02:56:30 -0400 (EDT)
From: cve-assign@...re.org
To: krahmer@...e.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE-Request: squid pinger remote DoS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I made a fix for squid 3.4.6 and request a CVE

> https://bugzilla.novell.com/show_bug.cgi?id=891268

Regardless of the "what happens to squid itself" answer, is it known
that the crash has a security impact? This message seemed to conclude
with an implied request for more information, e.g., "it looks like you
can," etc. An example of a security impact would be: the administrator
wanted pinger to be running, and a crash means that pinger
processes/threads are no longer available, and pinger is not
automatically restarted.

If there is a security impact, then the patch in Novell Bug 891268
would probably correspond to at least three CVE IDs, e.g.,

1. "used to index into a string array" possibly corresponds to
http://cwe.mitre.org/data/definitions/129.html for the modified
default case after case 136, and approximately two other places in the
patch

2. added "if (n <= 0)" code possibly corresponds to
http://cwe.mitre.org/data/definitions/389.html

3. added "if (preply.psize) < 0" code apparently corresponds to a more
general issue with missing data validation

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUF95xAAoJEKllVAevmvmsMiMIAIM7LbYrQTVH8bgbKj34D0WI
fHruTwHwpIXfs2YvmuSJLnvmMdtRyIe0Y5Nx6CLC9oL5mlaKCtiyGN3Y5tom37LS
/ro/Q5nv10VzWf2B67s1gaOKHhVr36bzCUaRWjj2ispiANxIdYGoEhmdABN2atE+
0IzkAXTsoPtfYBc3VHeLdLVnsrI0yV3c2btoaG0ABN39+5QGTCAct2m9rq19/HJ5
LMXjfIkjpwlzhhy0MCBevn6dFIn9iDFBsmeKXEnib284Re9TQ7kpM8lv1p0zvcFI
c+AYJn4WEV2FE7i4rNY/08ykxSZ+jrNV/mZnTLNLqFfRsVIPIc3RbdN6LYTFofs=
=mktA
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.