[24219] in bugtraq
Re: [Global InterSec 2002012101] DeleGate Application Proxy - Multiple Vulnerabilities
daemon@ATHENA.MIT.EDU (Kris Kennaway)
Sat Feb 9 01:51:47 2002
Date: Fri, 8 Feb 2002 17:32:16 -0800
From: Kris Kennaway <kris@obsecurity.org>
To: Global InterSec Research <lists@globalintersec.com>
Cc: bugtraq@securityfocus.com, research@globalintersec.com
Message-ID: <20020208173216.A87182@xor.obsecurity.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="dDRMvlgZJXvWKvBx"
Content-Disposition: inline
In-Reply-To: <017801c1b065$ba68f270$0b01a8c0@tomh61ib59mm58>; from lists@globalintersec.com on Thu, Feb 07, 2002 at 09:59:10PM -0800
--dDRMvlgZJXvWKvBx
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
On Thu, Feb 07, 2002 at 09:59:10PM -0800, Global InterSec Research wrote:
> DeleGate - A popular application layer proxy contains
> a number of buffer overflows which are remotely exploitable.
These vulnerabilities were publicized several years ago; the
developers appear to have made some effort to clean up the code, but
given the condition it was in to begin with it's not really any
surprise there are many problems remaining.
Just Don't Use It.
Kris
--dDRMvlgZJXvWKvBx
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org
iD8DBQE8ZHwgWry0BWjoQKURAmmRAKC19OtD5IHP1LJLN7XkT9Z8LASVigCglJim
rzemPZiAhVxL21zrkrkdQrI=
=joUt
-----END PGP SIGNATURE-----
--dDRMvlgZJXvWKvBx--