[17907] in bugtraq
Re: [RHSA-2000:116-05] Ethereal vulnerable to buffer overflows
daemon@ATHENA.MIT.EDU (Doug Barton)
Mon Dec 4 14:40:34 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <3A2ADBAD.5D1658B5@FreeBSD.org>
Date: Sun, 3 Dec 2000 15:47:57 -0800
Reply-To: Doug Barton <DougB@FREEBSD.ORG>
From: Doug Barton <DougB@FREEBSD.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
bugzilla@REDHAT.COM wrote:
>
> ---------------------------------------------------------------------
> Red Hat, Inc. Security Advisory
>
> Synopsis: Ethereal vulnerable to buffer overflows
> 3. Problem description:
>
> Versions of Ethereal prior to 0.8.14 are vulnerable to buffer overflows.
> The ethereal-0.8.14 packages correct this problem.
FYI, the FreeBSD port of ethereal was updated on November 21.
Doug
--
So what I want to know is, where does the RED brick road go?
Do YOU Yahoo!?