Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 08:52 AM, Andres Gomez wrote: > Name: Stack-based buffer overflow in Planeshift 0.5.9 and earlier > Software: Planeshift 0.5.9 Software link: > http://www.planeshift.it/ Vulnerability Type: Buffer overflow > > Vulnerability Details: >

Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 03:29 PM, Andres Gomez wrote: > Planeshift is an online multiplayer role playing game which is > open source (http://en.wikipedia.org/wiki/PlaneShift_(video_game)) > and "chatbubbles.xml" is a sort of configuration file for chat > windows

Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 09:53 PM, Andres Gomez wrote: > Hi kurt, > > The fact that only local user can modify program files doesn't > mean there is no security risk, there are a lot of examples but > look at this: > > http://cve.mitre.org/cgi-bin/cvename.cgi?n