Vuln: Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability
Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability
If it’s about security, you heard it here first
Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability
Need information, for MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow CVE-2008-5616
Posted by infocus on Jul 21
===================================================================
‘Celebrating 40 years of Apollo and 20 years of buffer overflows’
===================================================================
INFIGO IS Security Advisory…
DBD::Pg ‘pg_getline()’ and ‘getline()’ Heap Buffer Overflow Vulnerabilities
CastRipper ‘.m3u’ File Remote Stack Buffer Overflow Vulnerability
Sun Solstice AdminSuite ‘sadmind’ ‘adm_build_path()’ Remote Stack Buffer Overflow Vulnerability
Posted by Secunia Research on May 23
======================================================================
Secunia Research 23/05/2009
– Sun Solaris…
Stack-based buffer overflow in the btFiles::BuildFromMI function (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and probably earlier, and CTorrent 1.3.4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Torrent file containing a long path.
URL: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759
Pidgin Multiple Buffer Overflow Vulnerabilities
Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability
Novell GroupWise Internet Agent Email Address Processing Buffer Overflow Vulnerability
Nullsoft Winamp ‘gen_ff.dll’ Buffer Overflow Vulnerability
Domain name registries are scrambling to patch a newly discovered bug in popular open source DNS software that could be exploited for denial-of-service attacks.
The bug and a corresponding fix were announced Monday by NLnet Labs, a research group that provides authoritative domain name server software called NSD to domain name registrars.
The bug allows for an attack on an NSD server that would cause it to stop responding to queries. The bug affects all versions of NSD 2.0.0 to 3.2.1, NLnet Labs said calling the bugfix “critical.” The bug is a “one-byte buffer overflow that allows a carefully crafted exploit to take down your name server,” NLnet Labs said.
URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=31366
NSD ‘packet.c’ Off-By-One Buffer Overflow Vulnerability
<!– Envelope-to: email@address Delivery-date: Tue, 19 May 2009 22:45:39 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M6X7z-0002Ls-MA for email@address; Tue, 19 May 2009 22:45:39 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id F14AD2377E8; Tue, 19 May 2009 12:04:20 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 13577 invoked from network); 16 May 2009 08:22:17 -0000 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1242462134; l=5686; s=domk; d=trapkit.de; h=Content-Type:Subject:To:MIME-Version:From:Date:X-RZG-CLASS-ID: X-RZG-AUTH; bh=0bnuDmtOartTeOl1wt3wJ7bagf8=; b=ju7yVQs2i2JF7L5aazidnjVDdGbBE/UCLrVOZ2UY54Zr4+j6GXyJIqpZOlh5i1VS1ka e0NISF7Rz/7OegEFl37bWr3GgmUv3eRW8xXi3Fi/FgZXcCAEwzPOY4k7qdg5Qe20+/gUv DlQBr4q+tLRcmZVIN2ppVzPvQYzhAToXZjc= X-RZG-AUTH: :OGckYVKpa/RorD1n4vbkpyN1OrydUB3M3D078vRVBTvDAWjAyJ2Lqy4= X-RZG-CLASS-ID: mo00 Message-ID: <4A0E7787.2020602@trapkit.de> User-Agent: Mutt/1.5.19 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="————070107060709010308060402" X-IMAPbase: 1176125385 9121 Status: O X-UID: 9121 Content-Length: 5890 X-Keywords: