Saturday, September 18, 2010

ntop: daemon crash

Users of ntop please be advised of a daemon crash vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVSA-2010:181: [MDVSA-2010:181] ntop daemon crash
Problem Description:



A vulnerability has been found and corrected in ntop:



The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier

allows remote attackers to cause a denial of service (NULL pointer

dereference and daemon crash) via an Authorization HTTP header

that lacks a : (colon) character in the base64-decoded string

(CVE-2009-2732).


Read more at www.criticalwatch.com
 

No comments:

Post a Comment