handleAccept in rinetd before 0.62 does not properly resize the connection list when it becomes full and sets an array index incorrectly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of connections.
Link | Tags |
---|---|
http://www.debian.org/security/2003/dsa-289 | patch vendor advisory |
http://marc.info/?l=bugtraq&m=105059298502830&w=2 | mailing list |