[17907] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [RHSA-2000:116-05] Ethereal vulnerable to buffer overflows

daemon@ATHENA.MIT.EDU (Doug Barton)
Mon Dec 4 14:40:34 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <3A2ADBAD.5D1658B5@FreeBSD.org>
Date:         Sun, 3 Dec 2000 15:47:57 -0800
Reply-To: Doug Barton <DougB@FREEBSD.ORG>
From: Doug Barton <DougB@FREEBSD.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM

bugzilla@REDHAT.COM wrote:
>
> ---------------------------------------------------------------------
>                    Red Hat, Inc. Security Advisory
>
> Synopsis:          Ethereal vulnerable to buffer overflows

> 3. Problem description:
>
> Versions of Ethereal prior to 0.8.14 are vulnerable to buffer overflows.
> The ethereal-0.8.14 packages correct this problem.

	FYI, the FreeBSD port of ethereal was updated on November 21.

Doug
--
    So what I want to know is, where does the RED brick road go?

	Do YOU Yahoo!?

home help back first fref pref prev next nref lref last post