Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Oct 2008 12:21:04 -0500 (CDT)
From:      Jeffrey Goldberg <jeffrey@goldmark.org>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        security-officer@FreeBSD.org
Subject:   ports/128298: Security: mail/libspf2, mail/libspf2-10 buffer overflow
Message-ID:  <20081022172104.3829D2E005C@n118.ewd.goldmark.org>
Resent-Message-ID: <200810221740.m9MHe1eR039911@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         128298
>Category:       ports
>Synopsis:       Security: mail/libspf2, mail/libspf2-10 buffer overflow
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Oct 22 17:40:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Jeffrey Goldberg
>Release:        FreeBSD 7.1-PRERELEASE i386
>Organization:
>Environment:
System: FreeBSD dobby.ewd.goldmark.org 7.1-PRERELEASE FreeBSD 7.1-PRERELEASE #20: Thu Sep 4 17:09:34 CDT 2008 root@dobby.ewd.goldmark.org:/usr/obj/usr/src/sys/DOBBY i386


	
>Description:
	According to reports (I have not verified this personally), versions
        of libspf2 prior to 1.2.8 are vulnerable to exploits of a buffer
        overflow due to errors in how SPF records are parsed

          http://www.doxpara.com/?page_id=1256
>How-To-Repeat:
	
>Fix:

	Upgrade to libspf2 version 1.2.8


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20081022172104.3829D2E005C>