[25596] in bugtraq

home help back first fref pref prev next nref lref last post

Addendum to advisory #NISR29052002 (JRun buffer overflow)

daemon@ATHENA.MIT.EDU (NGSSoftware Insight Security Resea)
Wed May 29 16:46:01 2002

Message-ID: <00c201c2072f$1f16a3f0$4801010a@XU5UDGJMHXJ300>
From: "NGSSoftware Insight Security Research" <nisr@nextgenss.com>
To: <bugtraq@securityfocus.com>
Date: Wed, 29 May 2002 17:37:28 +0100
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

I have been asked by Macromedia to point out that the cumulative patch for
JRun 3.1 found at
http://www.macromedia.com/v1/Handlers/index.cfm?ID=22273&Method=Full
also addresses the buffer overflow vulnerability discussed in our advisory,
number #NISR29052002. Customers not wishing to upgrade to Version 4 should
install this patch.
Thanks,
David Litchfield
http://www.ngssoftware.com/



home help back first fref pref prev next nref lref last post