* Aymeric Vitte
> *Sent:* Sunday, 10 November 2019 6:33 AM
> *To:* LORD HIS EXCELLENCY JAMES HRMH ; Bitcoin
> Protocol Discussion ; Luke
> Dashjr
> *Cc:* secur...@bitcoincore.org
> *Subject:* Re: [bitcoin-dev] CVE-2017-18350 disclosure
>
>
> ???
>
>
> Well, y
MES HRMH
>
>
> --------------------
> *From:* Aymeric Vitte
> *Sent:* Saturday, 9 November 2019 6:40 AM
> *To:* LORD HIS EXCELLENCY JAMES HRMH ; Bitcoin
> Protocol Discussion ; Luke
> Dashjr
> *Cc:* secur...@bitcoincore
rom:* bitcoin-dev-boun...@lists.linuxfoundation.org
> on behalf of Luke
> Dashjr via bitcoin-dev
> *Sent:* Saturday, 9 November 2019 2:07 AM
> *To:* bitcoin-dev@lists.linuxfoundation.org
>
> *Cc:* secur...@bitcoincore.org
> *Subject:* [bitcoin-dev] CVE-2017-18350 dis
Sent: Saturday, 9 November 2019 2:07 AM
To: bitcoin-dev@lists.linuxfoundation.org
Cc: secur...@bitcoincore.org
Subject: [bitcoin-dev] CVE-2017-18350 disclosure
CVE-2017-18350 is a buffer overflow vulnerability which allows a malicious
SOCKS proxy server to overwrite the program stack on systems
CVE-2017-18350 is a buffer overflow vulnerability which allows a malicious
SOCKS proxy server to overwrite the program stack on systems with a signed
`char` type (including common 32-bit and 64-bit x86 PCs).
The vulnerability was introduced in 60a87bce873ce1f76a80b7b8546e83a0cd4e07a5
(SOCKS5 su