Users of please be advised of a DoS, code-execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
USN-994-1: [USN-994-1] libHX DoS, code-execution vulnerability
Details follow:
It was discovered that libHX incorrectly handled certain parameters to the
HX_split function. An attacker could use this flaw to cause a denial of
service or possibly execute arbitrary code with the privileges of the user.
The default compiler options for affected releases should reduce the
vulnerability to a denial of service.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/aDtYpt

No comments:
Post a Comment