Users of ntop please be advised of a daemon crash vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
MDVSA-2010:181: [MDVSA-2010:181] ntop daemon crash
Problem Description:
A vulnerability has been found and corrected in ntop:
The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier
allows remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) via an Authorization HTTP header
that lacks a : (colon) character in the base64-decoded string
(CVE-2009-2732).
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/aRqjSP

No comments:
Post a Comment