[22586] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-2001-25

daemon@ATHENA.MIT.EDU (Steve Watt)
Mon Sep 10 13:02:10 2001

Date: Sun, 9 Sep 2001 21:30:51 -0700 (PDT)
Message-Id: <200109100430.f8A4UpL11602@wattres.Watt.COM>
From: Steve Watt <steve+bugtraq@Watt.COM>
To: bugtraq@securityfocus.com

CERT Advisory  <cert-advisory@cert.org> wrote:
>CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
>intruders to execute arbitrary code
[ ... ]
>Network Associates, Inc.
>
>   PGP Security has published a security advisory describing this
>   vulnerability as well as patches. This is available from
>
>          http://www.pgp.com/support/product-advisories/csmap.asp
>          http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp

So, does anyone know whether this thoroughly useless advisory
affects those who are running smap/smapd from the TIS FWTK days?
Or is the overflow a newly introduced feature?

-- 
Steve Watt KD6GGD  PP-ASEL-IA          ICBM: 121W 56' 57.8" / 37N 20' 14.9"
 Internet: steve @ Watt.COM                         Whois: SW32
   Free time?  There's no such thing.  It just comes in varying prices...

home help back first fref pref prev next nref lref last post