Bug#292726: buffer overflow in charset (CAN-2005-0086)

2005-01-31 Thread Thomas Schoepf
The bug is Redhat specific. It was introduced by a patch they apply to less. This is a comment taken from https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527 Additional Comment #15 From Josh Bressers (Security Response Team) on 2005-01-25 09:27 --- I've done some investigating on

Bug#292726: buffer overflow in charset (CAN-2005-0086)

2005-01-31 Thread Joey Hess
Thomas Schoepf wrote: The bug is Redhat specific. It was introduced by a patch they apply to less. This is a comment taken from https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527 Additional Comment #15 From Josh Bressers (Security Response Team) on 2005-01-25 09:27 ---

Bug#292726: buffer overflow in charset (CAN-2005-0086)

2005-01-28 Thread Joey Hess
Package: less Version: 382-2 Severity: grave Tags: security patch less is vulnerable to a head-based buffer overflow that can be triggered by viewing certian binary files. This is theoretically exploitable by providing a user with such a file and waiting for him to run less on it. The problem