Hi Steffen,

Thanks for the report. I had a quick look at the advisory, apparently both
attacks have the same origin, TtaWCToMBstring().

Will have a look at fixing it, CC'ing upstream, since I haven't seen
anything about the advisory over there.

Regis

On Tue, December 2, 2008 19:20, Steffen Joeris wrote:
> Package: amaya
> Severity: grave
> Tags: security
> Justification: user security hole
>
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for amaya.
>
> CVE-2008-5282[0]:
> | Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1
> | allow remote attackers to execute arbitrary code via (1) a link with a
> | long HREF attribute, and (2) a DIV tag with a long id attribute.
>
> If you fix the vulnerability please also make sure to include the
> CVE id in your changelog entry.
>
> Cheers
> Steffen
>
> For further information see:
>
> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5282
>     http://security-tracker.debian.net/tracker/CVE-2008-5282
>
>
>




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to