*** This bug is a security vulnerability *** Public security bug reported:
Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX commands containing a large UBX payload length field. ** Affects: tmsnc (Ubuntu) Importance: Undecided Status: New ** Affects: tmsnc (Debian) Importance: Unknown Status: Unknown ** Visibility changed to: Public ** Bug watch added: Debian Bug tracker #487222 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222 ** Also affects: tmsnc (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222 Importance: Unknown Status: Unknown -- Stack-based buffer overflow in tmsnc CVE-2008-2828 https://bugs.launchpad.net/bugs/242517 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs