Package: overkill
Severity: important
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2006-2971: "Integer overflow in the recv_packet function in 0verkill
0.16 allows remote attackers to cause a denial of service (daemon crash)
via a UDP packet with fewer than 12 bytes, which results in a long
length value to the crc32 function."

There is a sample exploit [1] available.  Sarge and Woody may be affected.

Please mention the CVE in your changelog.

Thanks,

Alec

[1] http://www.securityfocus.com/archive/1/archive/1/436659/100/0/threaded

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD4DBQFEkL2hAud/2YgchcQRAomxAJjMfv7iEjb3Laci2o9bvwCjFQHbAKCkDpt3
pevbgxW//O2iq39xLliVEg==
=JvUJ
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to