On Wed, Oct 19, 2005 at 11:09:58AM +0200, Moritz Muehlenhoff wrote:
> Hi,
> as the attack is based on overflowing buf1[] through crafted len values
> taken from the packet header in BoGetDirection() and this function isn't
> present in 2.3 Debian doesn't seem to vulnerable.

Yes, based on the source code changes and the fact that the Bo preprocessor
was heavily modified for 2.4 (which is what ISS reviewed) seems like that
is true. I want to test the available exploits before closing #334606 though.

Javier

Attachment: signature.asc
Description: Digital signature

Reply via email to