[32174] in bugtraq
Libnids <= 1.17 buffer overflow
daemon@ATHENA.MIT.EDU (Rafal Wojtczuk)
Mon Oct 27 16:44:04 2003
Date: Mon, 27 Oct 2003 20:09:55 +0100
To: bugtraq@securityfocus.com
Message-ID: <20031027190955.GA24303@warszawa.7bulls.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Disposition: inline
From: rafal.wojtczuk@7bulls.com (Rafal Wojtczuk)
Hello,
Libnids is a library which implements the functionality of NIDS
E-component. Libnids provides IP defragmentation, TCP stream reassembly and
port scan detection.
Robert Watson <rwatson@FreeBSD.org> has found a bug in the part of
libnids code responsible for TCP reassembly. The flaw probably allows for
remote code execution. This vulnerability has been assigned a CVE name
CAN-2003-0850.
Applications not using libnids tcp reassembly (like scanlogd) are not
vulnerable; others, like dsniff, are potentially vulnerable.
All libnids versions <= 1.17 are vulnerable. Libnids 1.18, which fixes
this issue, is available at http://libnids.sourceforge.net.
Save yourself,
Nergal