Re: CERT Advisory CA-2001-25 (smap overflow)

From: Keith Young (kyoung@v-one.com)
Date: Mon Sep 10 2001 - 10:32:50 PDT

  • Next message: Jeremy Epstein: "RE: CERT Advisory CA-2001-25"

    Steve Watt wrote:
    > CERT Advisory  <cert-advisoryat_private> wrote:
    > 
    >>CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
    >>intruders to execute arbitrary code
    >>
    > [ ... ]
    > 
    >>Network Associates, Inc.
    >>
    >>  PGP Security has published a security advisory describing this
    >>  vulnerability as well as patches. This is available from
    >>
    >>         http://www.pgp.com/support/product-advisories/csmap.asp
    >>         http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp
    >>
    > 
    > So, does anyone know whether this thoroughly useless advisory
    > affects those who are running smap/smapd from the TIS FWTK days?
    > Or is the overflow a newly introduced feature?
    > 
    
    Steve,
    
    I'm testing this now. Results will be posted to the FWTK-users mailing 
    list and (if a vulnerability exists) to the "http://www.fwtk.org/" web site.
    
    -- 
    --Keith Young
    -kyoung@v-one.com
    -fwtk.org web site maintainer
    



    This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 16:40:50 PDT