Re: CERT Advisory CA-2001-25 (smap overflow)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Gauntlet 4.2 is vulnerable to the exploit.

MOD

>Date: Sun, 16 Sep 2001 13:00:52 -0400
> Keith Young <kyoung@v-one.com>Reply-To: kyoung@v-one.com
> bugtraq@securityfocus.com Re: CERT Advisory CA-2001-25 (smap overflow)
>
>>>> CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
>>>> intruders to execute arbitrary code
>>>>
>>> [ ... ]
>>>
>>>> Network Associates, Inc.
>>>>
>>>>  PGP Security has published a security advisory describing this
>>>>  vulnerability as well as patches. This is available from
>>>>
>>>>         http://www.pgp.com/support/product-advisories/csmap.asp
>>>>         http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp
>>>>
>>>
>>> So, does anyone know whether this thoroughly useless advisory
>>> affects those who are running smap/smapd from the TIS FWTK days?
>>> Or is the overflow a newly introduced feature?
>>>
>> 
>> I'm testing this now. Results will be posted to the FWTK-users mailing 
>> list and (if a vulnerability exists) to the "http://www.fwtk.org/"; web 
>> site.
>> 
>
>Due to a fwtk-users listserver outage, I could not post my results. 
>Therefore, I am posting them here.
>
>After several days of testing, I can say that the unmodified FWTK 2.1
>smap process is *NOT* vulnerable to the same overflow as Gauntlet. I 
>will be testing 2.1 smap+Joe Yao's patch next.
>
>Also, for those of you who asked me, the NAI notice is correct; Gauntlet 
>4.2 does not seem to be vulnerable to the buffer overflow.
>
>-- 
>--Keith Young
>-kyoung@v-one.com




------------------------------------------------------------
http://www.VirtualPhoneLine.com - Get a US Phone Line ANYWHERE in the world.
http://www.FreePhoneGuide.com - Call Pakistan for FREE

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux