Hi, as the attack is based on overflowing buf1[] through crafted len values taken from the packet header in BoGetDirection() and this function isn't present in 2.3 Debian doesn't seem to vulnerable.
Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]