Skip to content
This repository has been archived by the owner on May 6, 2020. It is now read-only.

Why does this contain a TIFF exploit? #89

Closed
methodbox opened this issue Oct 9, 2016 · 1 comment
Closed

Why does this contain a TIFF exploit? #89

methodbox opened this issue Oct 9, 2016 · 1 comment

Comments

@methodbox
Copy link

Seems fishy and popped up during the build process.

Let me know when you've cleaned this.

@havocked
Copy link

Hi,

According to the xcode project, during build time, it's running a script file called : OUIToVendorDB.py
In this one, it tries to download a file from this url: http://standards-oui.ieee.org/oui.txt , parsing it and store the data inside a local file: placed in the project directory: Resources/Generic/vendor.db

The txt file is a really big list gathering broadcast devices' vendors informations

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants