Summary: | net-analyzer/libnasl: DoS because if buffer overflow (not exploitable for code execution) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Raphael Marichez (Falco) (RETIRED) <falco> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | jaervosz, netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://archives.neohapsis.com/archives/bugtraq/2006-04/att-0519/os2a_1005.txt | ||
Whiteboard: | B3 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
Raphael Marichez (Falco) (RETIRED)
2006-04-25 14:38:24 UTC
I'd rather wait for an upstream release - it looks like Renaud Deraison is aware of the issue... Setting to upstream until Renaud comes up with a fixed version *** Bug 132352 has been marked as a duplicate of this bug. *** Rereading, this one is really sucky. I would just RESOLVED/INVALIDate it. I agree with Koon and closing as invalid. Feel free to reopen if you disagree. OK :) jaervosz was just here a few minutes before me |