Gkrellmd buffer overflow
24 Jun
2003
24 Jun
'03
23:22
Gkrellmd 2.1.* suffers from a buffer overflow where it does not validate the 128 byte buffer input, which allows an attack to crash the daemon resulting in a denial of service. Code for the denial of service has been provided, and an exploit to take advantage of this buffer overflow remotely is currently being written. Please disable Gkrellmd until a patch is released. - Adam Schmidt http://stream.gotdns.org/projects/gkrellmd.pl
7619
Age (days ago)
7619
Last active (days ago)
0 comments
1 participants
participants (1)
-
Adam Schmidt