Bugtraq mailing list archives
Re: Buffer overrun in Redhat 5.0
From: ask () NETCETERA DK (Ask Bjørn Hansen)
Date: Tue, 16 Dec 1997 00:28:54 +0100
Okay I noticed that if I ran tracroute with a really long param it segfaults and I wondered if I could exploit this, I could, I checked to see that I didn't have a twisted version of traceroute, I didn't, so I tried ping as well same result. That's when I posted.
From the redhat website (errata page for redhat 5.0):
Package: traceroute
Updated: 15-Dec-1997
Problem:
(15-Dec-1997) Security Fix: Fixes buffer overruns in traceroute.
Solution:
Intel: Upgrade to traceroute-1.4a5-5.i386.rpm
Alpha: Upgrade to traceroute-1.4a5-5.alpha.rpm
I would guess that it's this problems they have fixed. Better ask someone
at redhat...
kind regards,
ask
---------------------------------------------------------------------
ask bjoern hansen - Netcetera - Finsensvej 80 - DK-2000 Frederiksberg
tlf 38 88 32 22 / 40 44 58 66 / 38 88 20 38 ext 341 - Fax 38 88 30 38
Webdesign, Webhotel, Mailhotel, UUCP & more! http://www.netcetera.dk/
Current thread:
- Re: Buffer overrun in Redhat 5.0 Wilton Wong - ListMail (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Ask Bjørn Hansen (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Wilton Wong - ListMail (Dec 15)
- Security field notice: Cisco 7xx password buffer overflow security-alert () cisco com (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Ask Bjørn Hansen (Dec 15)
