| Originally published: Saturday, 3 June 2000 | Author: Derrick H. Lewis |
| Published to: news_enhance_security/Security News | Page: 1/1 [Standard view] |
Simple Network Time Sync daemon Buffer Overflow VulnerabilityA scanf overflow has been discovered in the Simple Network Time Sync daemon and client version 1.0. Currently the buffer overflow has been tested on RedHat 6.1. It may be possible to obtain root, although it appears one only has 50 characters to run code with.
|
|
(this article had no body text)