Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4b681520-4526-29ae-bc6a-d11a4a60d247@debian.org>
Date: Tue, 19 Sep 2017 20:45:39 -0400
From: Luciano Bello <luciano@...ian.org>
To: hosein.askari@....com
Cc: team@...urity.debian.org, oss-security@...ts.openwall.com
Subject: Re: [CVE-2017-14266] tcprewrite Heap-Based Buffer Overflow

On 09/19/2017 07:40 AM, hosein.askari@....com wrote:
> First of all, I realy appreciate for sen­ding me an email abo­ut the mentioned vul­nerability. I have examined the vulnerab­ility
> again on Ubuntu 16.04 due to your sent email. I have not tri­ed this vulnerability on the distributio­ns that you mentione­d. 
> The screenshot which illustrates differe­nt steps (POC) is se­nt via this email for your kind consider­ations and uploaded on this link:
> https://www.photobox­.co.uk/my/photo/full­?photo_id=9959498468

The link is 404ing. I might be creating the pcap wrongly. Can you make a
input pcap available?

thanks! /luciano

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.