Package: tcpreen
Severity: grave
Tags: security

Hi,
the following security issue was published for tcpreen[0]:
| TCPreen is prone to a remote buffer-overflow vulnerability because it fails to
| properly bounds-check user-supplied data before copying it to an 
insufficiently
| sized memory buffer.
|
| An attacker may exploit this issue to execute arbitrary code in the context of
| the affected application. Successful attacks may compromise affected 
computers.
| Failed exploit attempts will result in a denial of service.
|
| Versions of TCPreen prior to 1.4.4 are vulnerable.

For further information:
[0] http://www.securityfocus.com/bid/27018/info

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpDo2cdzCbYo.pgp
Description: PGP signature

Reply via email to