*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: sarg

References:
SUSE-SR:2008:006

Quoting CVE-2008-116:
"Stack-based buffer overflow in the useragent function in useragent.c in Squid 
Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute 
arbitrary code via a long Squid proxy server User-Agent header."

** Affects: sarg (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1167

-- 
[sarg] [CVE-2008-1167] arbitrary code execution
https://bugs.launchpad.net/bugs/203472
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to