Stack-based buffer overflow in tmsnc CVE-2008-2828
Bug #242517 reported by
Emanuele Gentili
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
tmsnc (Debian) |
Fix Released
|
Unknown
|
|||
tmsnc (Ubuntu) |
Fix Released
|
Medium
|
Emanuele Gentili | ||
Dapper |
Won't Fix
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
Unassigned | ||
Intrepid |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX commands containing a large UBX payload length field.
Changed in tmsnc: | |
assignee: | nobody → emgent |
importance: | Undecided → Medium |
status: | New → In Progress |
Changed in tmsnc: | |
status: | Unknown → Fix Released |
Changed in tmsnc: | |
status: | In Progress → Fix Released |
Changed in tmsnc: | |
status: | New → In Progress |
status: | New → Invalid |
status: | New → In Progress |
status: | In Progress → Fix Released |
status: | In Progress → Fix Released |
To post a comment you must log in.
Intrepid fix synced.