*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: sarg
References:
SUSE-SR:2008:006
Quoting CVE-2008-116:
"Stack-based buffer overflow in the useragent function in useragent.c in Squid
Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute
arbitrary code via a long Squid proxy server User-Agent header."
** Affects: sarg (Ubuntu)
Importance: Undecided
Status: New
** Visibility changed to: Public
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1167
--
[sarg] [CVE-2008-1167] arbitrary code execution
https://bugs.launchpad.net/bugs/203472
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs