Summary: | mail-client/mutt buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Roman Pertl <devnull> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | critical | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.securityfocus.com/bid/14596 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Roman Pertl
2005-08-19 16:12:53 UTC
It only affects openbsd as bug #103050 says :P I'm sorry to opened a new bug.. I did only a search for open bugs.. anyway, the advisory says that: Since this and other such experiments cause the propolice canary to get damaged (being right next to the return address), it seems very likely for this to be exploitable, except on system such as OpenBSD that include ProPolice by default. so it looks to me that OpenBSD is not vulnerable, but it does not definitly say linux is not vulnerable? |