[19482] in bugtraq
Remote buffer overflow,
daemon@ATHENA.MIT.EDU (Paul Starzetz)
Mon Mar 5 16:52:13 2001
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3AA3F42D.93632DD1@starzetz.de>
Date: Mon, 5 Mar 2001 21:16:45 +0100
Reply-To: Paul Starzetz <paul@STARZETZ.DE>
From: Paul Starzetz <paul@STARZETZ.DE>
X-To: kl@snafu.de
To: BUGTRAQ@SECURITYFOCUS.COM
Small correction:
One needs at least one _non_ OPERED line in tkserv.access in order to be vulnerable to the mentioned
buffer overflow attack. I've read the code too fast :-)
ihq.