[Secure-testing-team] DTSA processing WIP code

Moritz Muehlenhoff jmm at inutil.org
Wed Jun 22 13:31:16 UTC 2005


Hi,
attached you can find some WIP code for processing DTSAs. It's
in early stages, but I guess it already shows where it's heading.
Feedback welcome. HTML overview is not handled yet.

Cheers,
        Moritz
-------------- next part --------------
A non-text attachment was scrubbed...
Name: dtsa.py
Type: text/x-python
Size: 4171 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20050622/e46e643e/dtsa.py
-------------- next part --------------
source: hotzenplotz
date: 2005-11-12
vuln-type: buffer overflows
cve: CAN-1978-0019
vendor-advisory: http://www.hotzenplotz.org/sec/buffer-overflow.html
testing-fix: 3.14-1ts1
sid-fix: 3.14-2

User authentication in hotzenplotz does not verify the user name properly.
A buffer overflow can be exploited to execute arbitrary code with elevated
privileges.



More information about the Secure-testing-team mailing list