Saturday, October 2, 2010

libHX: DoS, code-execution vulnerability

Users of please be advised of a DoS, code-execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-994-1: [USN-994-1] libHX DoS, code-execution vulnerability
Details follow:



It was discovered that libHX incorrectly handled certain parameters to the

HX_split function. An attacker could use this flaw to cause a denial of

service or possibly execute arbitrary code with the privileges of the user.



The default compiler options for affected releases should reduce the

vulnerability to a denial of service.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment