--On Sunday, September 09, 2001 9:30 PM -0700 Steve Watt <steve+bugtraqat_private> wrote: > CERT Advisory <cert-advisoryat_private> wrote: >> CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows >> intruders to execute arbitrary code > [ ... ] >> Network Associates, Inc. >> >> PGP Security has published a security advisory describing this >> vulnerability as well as patches. This is available from >> >> http://www.pgp.com/support/product-advisories/csmap.asp >> http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp > > So, does anyone know whether this thoroughly useless advisory > affects those who are running smap/smapd from the TIS FWTK days? > Or is the overflow a newly introduced feature? I was able to find the following information, which may be of some use to you Steve. http://www.fwtk.org/fwtk/docs/documentation.html#1.3 "The Gauntlet Internet Firewall and the TIS Internet Firewall Toolkit do not share the same code base for anything, typically, and haven't since version 1.0. (There may be a proxy or two that is identical in cases where TIS decided to just give the code away to the FWTK users." Best Regards, Ian Ian Finlay Internet Systems Security Analyst - CERT/CC Operations Networked Systems Survivability Program =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CERT (R) Coordination Center Email: certat_private Software Engineering Institute WWW: http://www.cert.org Carnegie Mellon University Hotline: +1-412-268-7090 Pittsburgh, PA USA 15213-3890 FAX: +1-412-268-6989 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 19:12:55 PDT