[22586] in bugtraq
Re: CERT Advisory CA-2001-25
daemon@ATHENA.MIT.EDU (Steve Watt)
Mon Sep 10 13:02:10 2001
Date: Sun, 9 Sep 2001 21:30:51 -0700 (PDT)
Message-Id: <200109100430.f8A4UpL11602@wattres.Watt.COM>
From: Steve Watt <steve+bugtraq@Watt.COM>
To: bugtraq@securityfocus.com
CERT Advisory <cert-advisory@cert.org> wrote:
>CERT Advisory CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
>intruders to execute arbitrary code
[ ... ]
>Network Associates, Inc.
>
> PGP Security has published a security advisory describing this
> vulnerability as well as patches. This is available from
>
> http://www.pgp.com/support/product-advisories/csmap.asp
> http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp
So, does anyone know whether this thoroughly useless advisory
affects those who are running smap/smapd from the TIS FWTK days?
Or is the overflow a newly introduced feature?
--
Steve Watt KD6GGD PP-ASEL-IA ICBM: 121W 56' 57.8" / 37N 20' 14.9"
Internet: steve @ Watt.COM Whois: SW32
Free time? There's no such thing. It just comes in varying prices...