[24219] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Global InterSec 2002012101] DeleGate Application Proxy - Multiple Vulnerabilities

daemon@ATHENA.MIT.EDU (Kris Kennaway)
Sat Feb 9 01:51:47 2002

Date: Fri, 8 Feb 2002 17:32:16 -0800
From: Kris Kennaway <kris@obsecurity.org>
To: Global InterSec Research <lists@globalintersec.com>
Cc: bugtraq@securityfocus.com, research@globalintersec.com
Message-ID: <20020208173216.A87182@xor.obsecurity.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
	protocol="application/pgp-signature"; boundary="dDRMvlgZJXvWKvBx"
Content-Disposition: inline
In-Reply-To: <017801c1b065$ba68f270$0b01a8c0@tomh61ib59mm58>; from lists@globalintersec.com on Thu, Feb 07, 2002 at 09:59:10PM -0800

--dDRMvlgZJXvWKvBx
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Thu, Feb 07, 2002 at 09:59:10PM -0800, Global InterSec Research wrote:

>    DeleGate - A popular application layer proxy contains
>    a number of buffer overflows which are remotely exploitable.

These vulnerabilities were publicized several years ago; the
developers appear to have made some effort to clean up the code, but
given the condition it was in to begin with it's not really any
surprise there are many problems remaining.

Just Don't Use It.

Kris

--dDRMvlgZJXvWKvBx
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE8ZHwgWry0BWjoQKURAmmRAKC19OtD5IHP1LJLN7XkT9Z8LASVigCglJim
rzemPZiAhVxL21zrkrkdQrI=
=joUt
-----END PGP SIGNATURE-----

--dDRMvlgZJXvWKvBx--

home help back first fref pref prev next nref lref last post