A locally exploitable buffer overflow exists in mllock.
Based on a public report, it appears there is a locally exploitable buffer overflow in the mllockcommand that is included with CA-MLINK.
A local attacker can execute arbitrary code on the vulnerable host.
The CERT/CC is currently unaware of a practical solution to this problem.
The CERT/CC credits KF
This document was written by Ian A. Finlay.
|Date First Published:||2002-05-16|
|Date Last Updated:||2002-05-16 17:59 UTC|