Package: dillo
Version: 0.8.1-1
Severity: grave
Tags: pending security sarge

The problem below seems to be fixed in the version in sid (0.8.3-1) but
not yet in the version in sarge), hence this bug report.  This bug report
is meant to track this issue.  Please close it when the fixed pacakge
enters sarge.


======================================================
Candidate: CAN-2005-0012
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20050104
Category: SF
Reference: GENTOO:GLSA-200501-11
Reference: URL:http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml
Reference: BID:12203
Reference: URL:http://www.securityfocus.com/bid/12203
Reference: SECUNIA:13760
Reference: URL:http://secunia.com/advisories/13760/
Reference: XF:dillo-capi-format-string(18807)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18807

Format string vulnerability in the a_Interface_msg function in Dillo
before 0.8.3-r4 allows remote attackers to execute arbitrary code via
format string specifiers in a web page.


Regards,

        Joey

-- 
There are lies, statistics and benchmarks.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to