The TCP reassembly functionality in libnids before 1.18 allows remote attackers to cause "memory corruption" and possibly execute arbitrary code via "overlarge TCP packets."
Link | Tags |
---|---|
http://secunia.com/advisories/10543 | third party advisory |
http://sourceforge.net/project/shownotes.php?release_id=191323 | vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000773 | vendor advisory |
http://marc.info/?l=bugtraq&m=106728224210446&w=2 | mailing list |
http://www.debian.org/security/2004/dsa-410 | patch vendor advisory |