[32174] in bugtraq

home help back first fref pref prev next nref lref last post

Libnids <= 1.17 buffer overflow

daemon@ATHENA.MIT.EDU (Rafal Wojtczuk)
Mon Oct 27 16:44:04 2003

Date: Mon, 27 Oct 2003 20:09:55 +0100
To: bugtraq@securityfocus.com
Message-ID: <20031027190955.GA24303@warszawa.7bulls.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Disposition: inline
From: rafal.wojtczuk@7bulls.com (Rafal Wojtczuk)

Hello,
	Libnids is a library which implements the functionality of NIDS
E-component. Libnids provides IP defragmentation, TCP stream reassembly and
port scan detection.
	Robert Watson <rwatson@FreeBSD.org> has found a bug in the part of 
libnids code responsible for TCP reassembly. The flaw probably allows for 
remote code execution. This vulnerability has been assigned a CVE name 
CAN-2003-0850.
	Applications not using libnids tcp reassembly (like scanlogd) are not 
vulnerable; others, like dsniff, are potentially vulnerable.
	All libnids versions <= 1.17 are vulnerable. Libnids 1.18, which fixes 
this issue, is available at http://libnids.sourceforge.net.

Save yourself,
Nergal

home help back first fref pref prev next nref lref last post