Re: CERT Advisory CA-2001-25 (smap overflow)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




>>> CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
>>> intruders to execute arbitrary code
>>>
>> [ ... ]
>>
>>> Network Associates, Inc.
>>>
>>>  PGP Security has published a security advisory describing this
>>>  vulnerability as well as patches. This is available from
>>>
>>>         http://www.pgp.com/support/product-advisories/csmap.asp
>>>         http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp
>>>
>>
>> So, does anyone know whether this thoroughly useless advisory
>> affects those who are running smap/smapd from the TIS FWTK days?
>> Or is the overflow a newly introduced feature?
>>
> 
> I'm testing this now. Results will be posted to the FWTK-users mailing 
> list and (if a vulnerability exists) to the "http://www.fwtk.org/"; web 
> site.
> 

Due to a fwtk-users listserver outage, I could not post my results. 
Therefore, I am posting them here.

After several days of testing, I can say that the unmodified FWTK 2.1
smap process is *NOT* vulnerable to the same overflow as Gauntlet. I 
will be testing 2.1 smap+Joe Yao's patch next.

Also, for those of you who asked me, the NAI notice is correct; Gauntlet 
4.2 does not seem to be vulnerable to the buffer overflow.

-- 
--Keith Young
-kyoung@v-one.com


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux