David Colliver wrote:
> Try this
> http://secunia.com/advisories/22559/
> 
> There are two mentions of it. This one for SMTP, the other for the
> POP3.

Only, there's neither a SMTP nor a POP3 server shipped with ICS.
You propably need to rework your code.

--
Arno Garrels [TeamICS]
http://www.overbyte.be/eng/overbyte/teamics.html


> 
> This one has more information, including code to exploit it.
> http://www.securityfocus.com/bid/20709
> 
> I am just about to upload a probable fix to my initial server.
> 
> Best regards,
> Dave Colliver.
> http://www.AshfieldFOCUS.com
> ~~
> http://www.FOCUSPortals.com - Local franchises available
> ----- Original Message -----
> From: "Arno Garrels" <[EMAIL PROTECTED]>
> To: "ICS support mailing" <twsocket@elists.org>
> Sent: Friday, March 16, 2007 8:16 PM
> Subject: Re: [twsocket] Buffer overflow in SMTP
> 
> 
>> David Colliver wrote:
>>> Hi Piotr,
>>> 
>>> I just happened to come across the vulnerability as someone has
>>> reported it on many security websites.
>> 
>> Any links?
>> 
>> BTW: You talked  about client components ( SMTP or POP3 ? ), targets
>> of buffer overflow-attacks usually are servers, otherwise the 
>> server was the attacker.
>> 
>> --
>> Arno Garrels [TeamICS]
>> http://www.overbyte.be/eng/overbyte/teamics.html
>> 
>> 
>> 
>> 
>> 
>> --
>> To unsubscribe or change your settings for TWSocket mailing list
>> please goto http://www.elists.org/mailman/listinfo/twsocket
>> Visit our website at http://www.overbyte.be
-- 
To unsubscribe or change your settings for TWSocket mailing list
please goto http://www.elists.org/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to