Bug#394025: Remote compromise

Ben Hutchings ben at decadent.org.uk
Sun Oct 22 23:41:54 UTC 2006


The submitter sent me private mail, telling me:
- a little more explanation of how this can be exploited
- that this is exploitable in a stock installation in sarge
- that read() can overwrite part of the buffer before returning EFAULT
- that company policy forbids him from providing a working exploit

I think we'll have to work on the basis that the upstream fix is
necessary and sufficient.

Ben.

-- 
Ben Hutchings -- ben at decadentplace.org.uk shortened to ben at decadent.org.uk
If you've signed my GPG key, please send a signature on and to the new uid.
Sturgeon's Law: Ninety percent of everything is crap.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20061023/5f829994/attachment.pgp


More information about the Pkg-voip-maintainers mailing list