Re: [SECURITY] New versions of netstd fixes buffer overflows

From: Chip Salzenberg (chipat_private)
Date: Mon Jan 04 1999 - 18:00:03 PST

  • Next message: Karl Stevens: "Re: PATH variable in zip-slackware 2.0.35"

    According to debian-security-announceat_private:
    > We have received reports that the netstd suffered from two buffer
    > overflows. The first problem is an exploitable buffer overflow in the
    > bootp server. The second problem is an overflow in the FTP client. Both
    > problems are fixed in a new netstd package, version 3.07-2hamm.4 .
    
    What about the version in potato, 3.07-7?  Is it vulnerable, too?
    --
    Chip Salzenberg      - a.k.a. -      <chipat_private>
          "When do you work?"   "Whenever I'm not busy."
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:27:30 PDT