From gtheall at tenable.com Fri Nov 1 10:27:01 2013 From: gtheall at tenable.com (George Theall) Date: Fri, 1 Nov 2013 15:27:01 +0000 Subject: [VIM] VideoCharge Studio '.vsc' File Handling Remote Buffer Overflow Vulnerability Message-ID: <0E138346-05B0-4B1E-A7F0-5528070E7F08@tenable.com> Dinesh / Narayan / Venkat / Rob : Can you clarify how BID 63364, which was created earlier this week, differs from BID 45183, from 2010? It looks like yet another duplicate to me. George -- theall at tenable.com From Dinesh_Theerthagiri at symantec.com Fri Nov 8 08:20:55 2013 From: Dinesh_Theerthagiri at symantec.com (Dinesh Theerthagiri) Date: Fri, 8 Nov 2013 06:20:55 -0800 Subject: [VIM] VideoCharge Studio '.vsc' File Handling Remote Buffer Overflow Vulnerability In-Reply-To: <0E138346-05B0-4B1E-A7F0-5528070E7F08@tenable.com> References: <0E138346-05B0-4B1E-A7F0-5528070E7F08@tenable.com> Message-ID: <86E9E90EE35E9041B100B9ED1D5C8B57452B67053A@APJ1XCHEVSPIN30.SYMC.SYMANTEC.COM> George, Apologies for the delayed reply. BID 63364 is duplicate of BID 45183. BID 45183 is update with affected technologies and exploit code. And retired 63364 Thanks, T.Dinesh -----Original Message----- From: vim-bounces at attrition.org [mailto:vim-bounces at attrition.org] On Behalf Of George Theall Sent: Friday, November 01, 2013 8:57 PM To: Vulnerability Information Managers Subject: [VIM] VideoCharge Studio '.vsc' File Handling Remote Buffer Overflow Vulnerability Dinesh / Narayan / Venkat / Rob : Can you clarify how BID 63364, which was created earlier this week, differs from BID 45183, from 2010? It looks like yet another duplicate to me. George -- theall at tenable.com