Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <63d294aeacf743cab535163f5212a6c7@imshyb02.MITRE.ORG>
Date: Sat, 17 Dec 2016 20:13:50 -0500
From: <cve-assign@...re.org>
To: <gjoko@...oscience.mk>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: CVE request - DCMTK remote stack buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://github.com/commontk/DCMTK/commit/1b6bb76073a0601b85e90d5b1a5f0c80efe9e7f8
> https://www.exploit-db.com/exploits/40928/
> http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php

We did not see an efficient way to represent
1b6bb76073a0601b85e90d5b1a5f0c80efe9e7f8 as a set of independent
exploitable vulnerabilities. Thus, we are assigning one CVE ID for all
of the vulnerability information in the above three references. The
information all seems to be related to mishandling of "wrong length of
ACSE data structures received over the network" (typically a long
string sent to TCP port 4242).

Use CVE-2015-8979.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYVeJ4AAoJEHb/MwWLVhi2uoUQAKCfq7V0TdOe15kyeDbsVrOY
z/o9Mb5p1tsU9gcr90WNafuLVGtj1HLnN0++TVAq9DI8eEg+9cCpGVcEo3yhPvFz
ldAUi323dMGE5RI4/HaRSQVU2lie80Aa4fhClFcXNSC7P9Ou3ZDxvIDAgDS4Bhfe
iKz6jEimDSBZ5M9y2A2CDRZsxELiFCXIyHvXhzC1ivrgNoi1yw735ZW2renndZG4
OzFA/rZgW2gbCyMMnM2bHidYpk1hvdJSBLlnJlGLZ1hvGYqFiOw9rq6InDff8Uym
s8srNHb2kylODnnUYl39mUlBGId50wRbi4gWR47tUOizOZP0+HShTgGKdeoHWei3
/jKt6YVsWPnbL4bGZsKCI688uvf57lW3mked6WJWGHRTt/wujzKBYRRfkV0erOy+
UK7g0y4WQxOxSqWvAwNq6RPQaVs2UFE+a+Yzt4ao3MYb12Y7p5aGVcxasmOCnhbz
RbaVBPU/m7lgOM4tT6rjwJSrHsm1OIdvAaeT5sAnV1VoBIPua4kqmhL8SE9IEiV9
RlhXWlg2zfId9E9i603XIoffWlNcVbQ4e6fs9nysTWy5fBtMBsTeAtH4R+ByPLst
eZeoyldoU/+ujAxLavc1ibNQG60/7iKnlSDtFE/dhb35ziSblECD/3inlEABC4Vk
K1DJz5YISme9Xbpp6RFS
=4GGa
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.