tBB wrote:

> Oh, then I'm sure you will find this an interesting reading too:

> http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=roaring+penguin+software+vulnerabil%2A&x=0&y=0

It is interesting.  Two products and only 5 supposed vulnerabilities
in 7 years.  (Item 6 is an article I wrote.)

Now let's look at the vulnerabilities in detail:

1 Roaring Penguin Software MIMEDefang Unspecified Remote Buffer
Overflow Vulnerability (Vulnerabilities) Rank: 1000

I (author of MIMEDefang) discovered that during a code audit.  I fixed it
and then notified CERT of the vulnerability.  I do not believe the
vulnerability could be exploited to run arbitrary code, but I decided to
play it safe anyway.

2 Roaring Penguin Software MIMEDefang Multiple Unspecified
Vulnerabilities (Vulnerabilities) Rank: 888

That was something again that I discovered, fixed and then notified CERT
about.  It was a NULL pointer dereference possibility.

3 Roaring Penguin PPPoE Denial of Service Vulnerability
(Vulnerabilities) Rank: 398

That one I didn't discover.  It was fixed within 5 minutes of being
reported to me, and the worst that could happen was that a malicious
adversary could cause your PPP connection to keep dropping.

4 Roaring Penguin PPPoE Arbitrary File Overwrite Vulnerability
(Vulnerabilities) Rank: 369

That one was bogus.  See
http://archive.cert.uni-stuttgart.de/bugtraq/2005/11/msg00195.html

PPPoE was never designed to run SUID-root.  Debian decided to run it SUID
root.  STUPID!  That's like saying "cat" is vulnerable if you install it
SUID-root.  Duh!  In response, I made pppoe *refuse* to run SUID-root so
idiotic misconfigurations wouldn't be blamed on me.

5 Multiple Vendor Email Message Fragmentation SMTP Filter Bypass
Vulnerability (Vulnerabilities) Rank: 282

That's endemic to the message/partial MIME type.  So the MIMEDefang filter
was tweaked to reject message/partial; problem solved.

So yes, three real vulnerabilities across two products in seven years, with
only one of them possibly allowing remote execution of arbitrary code (and
even that is very doubtful.)  I think it stacks up pretty well.

Regards,

David.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to