severity 411294 important
thanks

Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
is not exploitable over the ISDN network, as the generated CAPI messages
cannot reach a size allowing an overflow.

This could only be theoretically exploited if there's a pure CAPI server
and even then it's only DoS.

So there's no need to treat this as an RC bug.

Cheers,
        Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to