*** This bug is a security vulnerability ***

Public security bug reported:

Stack-based buffer overflow in tmsnc allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via an MSN
packet with a UBX commands containing a large UBX payload length field.

** Affects: tmsnc (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: tmsnc (Debian)
     Importance: Unknown
         Status: Unknown

** Visibility changed to: Public

** Bug watch added: Debian Bug tracker #487222
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222

** Also affects: tmsnc (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222
   Importance: Unknown
       Status: Unknown

-- 
Stack-based buffer overflow in tmsnc CVE-2008-2828
https://bugs.launchpad.net/bugs/242517
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to