Vulnerabilità: CVE-2007-4770

libicu in International Components for Unicode (ICU) 3.8.1 e precedenti tentativi di backreference processo al gruppo inesistente cattura zero (aka \ 0), che potrebbe consentire agli aggressori dipendenti dal contesto di leggere da, o scrivere a, out-of-bounds locazioni di memoria, legati alla corruzione di REStackFrames.


http://www.securityfocus.com/bid/27455
http://www.securityfocus.com/archive/1/487677/100/0/threaded
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0043
http://www.openoffice.org/security/cves/CVE-2007-4770.html
http://www.openoffice.org/security/cves/CVE-2007-5745.html
https://bugzilla.redhat.com/show_bug.cgi?id=429023
https://issues.rpath.com/browse/RPL-2199
http://www.debian.org/security/2008/dsa-1511
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00896.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00921.html
http://security.gentoo.org/glsa/glsa-200803-20.xml
http://security.gentoo.org/glsa/glsa-200805-16.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:026
http://sourceforge.net/mailarchive/message.php?msg_name=d03a2ffb0801221538x68825e42xb4a4aaf0fcccecbd%40mail.gmail.com
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11172
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5507
http://rhn.redhat.com/errata/RHSA-2008-0090.html
http://securitytracker.com/id?1019269
http://secunia.com/advisories/28575
http://secunia.com/advisories/28615
http://secunia.com/advisories/28669
http://secunia.com/advisories/28783
http://secunia.com/advisories/29194
http://secunia.com/advisories/29242
http://secunia.com/advisories/29291
http://secunia.com/advisories/29294
http://secunia.com/advisories/29333
http://secunia.com/advisories/29852
http://secunia.com/advisories/29910
http://secunia.com/advisories/29987
http://secunia.com/advisories/30179
http://sunsolve.sun.com/search/document.do?assetkey=1-26-231641-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-233922-1
http://www.novell.com/linux/security/advisories/2008_23_openoffice.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://www.ubuntu.com/usn/usn-591-1
http://www.vupen.com/english/advisories/2008/0282
http://www.vupen.com/english/advisories/2008/0807/references
http://www.vupen.com/english/advisories/2008/1375/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/39938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi