Package: tcpreen Severity: grave Tags: security Hi, the following security issue was published for tcpreen[0]: | TCPreen is prone to a remote buffer-overflow vulnerability because it fails to | properly bounds-check user-supplied data before copying it to an insufficiently | sized memory buffer. | | An attacker may exploit this issue to execute arbitrary code in the context of | the affected application. Successful attacks may compromise affected computers. | Failed exploit attempts will result in a denial of service. | | Versions of TCPreen prior to 1.4.4 are vulnerable.
For further information: [0] http://www.securityfocus.com/bid/27018/info Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpDo2cdzCbYo.pgp
Description: PGP signature