On Tuesday 29 January 2008, Stuart Henderson wrote: > On 2008/01/28 20:05, Richard P. Koett wrote: > > The machine is running poptop-1.1.4.b4p1. Someone did an audit and > > declared "PoPToP servers prior to version 1.1.4-bs are vulnerable to a > > buffer overflow". > > Nice of PoPToP to warn about this on their web page (not...)
Yeah, I noticed this as well - no security history or vulnerabilities even mentioned... > > I notice that even the current version of OpenBSD has a package for > > poptop-1.1.4.b4p1, so I find it hard to believe that this version > > contains a known buffer overflow. > > propolice might catch it (in which case poptop will stop running). > the exploit code is at http://marc.info/?l=bugtraq&m=105068728421160&w=2 > if you want to try it to find out whether or not you get a shell. Note that that exploit is for versions earlier than 1.1.4.b3 - the previous ports version was 1.1.4.b4, which one would presume is patched for this vulnerability. Obviously this assumes that no other exploits have been found since version 1.1.4.b4. > the -current version of OpenBSD has PoPToP 1.3.0 in ports and packages. > the last release does have the older version. -- ---------------------------------------------------------------------------- => Joel Sing | [EMAIL PROTECTED] | 0419 577 603 <= ---------------------------------------------------------------------------- "Real stupidity beats artificial intelligence every time." - Terry Pratchett, Hogfather