Re: CERT Advisory CA-2001-25 (smap overflow)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Steve Watt wrote:
> CERT Advisory  <cert-advisory@cert.org> wrote:
> 
>>CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
>>intruders to execute arbitrary code
>>
> [ ... ]
> 
>>Network Associates, Inc.
>>
>>  PGP Security has published a security advisory describing this
>>  vulnerability as well as patches. This is available from
>>
>>         http://www.pgp.com/support/product-advisories/csmap.asp
>>         http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp
>>
> 
> So, does anyone know whether this thoroughly useless advisory
> affects those who are running smap/smapd from the TIS FWTK days?
> Or is the overflow a newly introduced feature?
> 

Steve,

I'm testing this now. Results will be posted to the FWTK-users mailing 
list and (if a vulnerability exists) to the "http://www.fwtk.org/"; web site.

-- 
--Keith Young
-kyoung@v-one.com
-fwtk.org web site maintainer


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux