Bugtraq mailing list archives
Re: Buffer overrun in Redhat 5.0
From: ask () NETCETERA DK (Ask Bjørn Hansen)
Date: Tue, 16 Dec 1997 00:28:54 +0100
Okay I noticed that if I ran tracroute with a really long param it segfaults and I wondered if I could exploit this, I could, I checked to see that I didn't have a twisted version of traceroute, I didn't, so I tried ping as well same result. That's when I posted.
From the redhat website (errata page for redhat 5.0):
Package: traceroute Updated: 15-Dec-1997 Problem: (15-Dec-1997) Security Fix: Fixes buffer overruns in traceroute. Solution: Intel: Upgrade to traceroute-1.4a5-5.i386.rpm Alpha: Upgrade to traceroute-1.4a5-5.alpha.rpm I would guess that it's this problems they have fixed. Better ask someone at redhat... kind regards, ask --------------------------------------------------------------------- ask bjoern hansen - Netcetera - Finsensvej 80 - DK-2000 Frederiksberg tlf 38 88 32 22 / 40 44 58 66 / 38 88 20 38 ext 341 - Fax 38 88 30 38 Webdesign, Webhotel, Mailhotel, UUCP & more! http://www.netcetera.dk/
Current thread:
- Re: Buffer overrun in Redhat 5.0 Wilton Wong - ListMail (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Ask Bjørn Hansen (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Wilton Wong - ListMail (Dec 15)
- Security field notice: Cisco 7xx password buffer overflow security-alert () cisco com (Dec 15)
- Re: Buffer overrun in Redhat 5.0 Ask Bjørn Hansen (Dec 15)