From: J. R. Molloy (jr@shasta.com)
Date: Sat Mar 24 2001 - 13:36:10 MST
From: <Eugene.Leitl@lrz.uni-muenchen.de>
> I'm looking forward to the CERT advisory on The Spike ;)
> From: CERT Advisory <cert-advisory@cert.org>
> Subject: CERT Advisory CA-979.057 - Vulnerability in Spike 898.872.3
>
> Topic: ULT-MIME Conversion Buffer Overflow in Spike V. 898.872.3.
>
> The CERT Coordination Center has received reports of a vulnerability in
> spike simulator version 898.872.3. By sending a carefully crafted
> message to a system running a vulnerable version of spike sim, intruders
> may be able to force spike to execute arbitrary commands with root
> privileges.
[blah]
> In most cases, ULT-MIME conversion of MPI is done on final delivery;
> that is, to the local simulacrums or cellular automata. Therefore, this
> "All Your Base Are Belong To Us" vulnerability may be exploited on
> systems despite firewalls and other network boundary protective
measures.
_______________________
τΏτ
Stay hungry,
--J. R.
Useless hypotheses:
consciousness, phlogiston, philosophy, vitalism, mind, free will
http://public.logica.com/~stepneys/bib/nf/d/deutsch.htm
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 08:06:39 MST