Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » James Theiler opt logging buffer overflow vulnerability

James Theiler opt logging buffer overflow vulnerability

by Mario Miri on May 13th, 2003 Reportedly, several libopt.a functions do not perform sufficient memory bounds checking, which leads to possibility of buffer overflow attacks on programs which link this library. Currently, there are no known SUID programs which use this library.


Vulnerable:
James Theiler opt 3.12
James Theiler opt 3.13
James Theiler opt 3.16
James Theiler opt 3.17
James Theiler opt 3.18


Solution:
The issue has been addressed in current version of the software:
http://nis-www.lanl.gov/~jt/Software/opt/opt-3.19.tar.gz


Discovered by:
KF, [email protected]


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »