CERT Advisory <cert-advisory@cert.org> wrote: >CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows >intruders to execute arbitrary code [ ... ] >Network Associates, Inc. > > PGP Security has published a security advisory describing this > vulnerability as well as patches. This is available from > > http://www.pgp.com/support/product-advisories/csmap.asp > http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp So, does anyone know whether this thoroughly useless advisory affects those who are running smap/smapd from the TIS FWTK days? Or is the overflow a newly introduced feature? -- Steve Watt KD6GGD PP-ASEL-IA ICBM: 121W 56' 57.8" / 37N 20' 14.9" Internet: steve @ Watt.COM Whois: SW32 Free time? There's no such thing. It just comes in varying prices...