lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20110328064728.GA478@agathon> Date: Mon, 28 Mar 2011 08:47:28 +0200 From: GomoR <gomor-fd@...or.org> To: full-disclosure@...ts.grok.org.uk Subject: Re: SSL Capable NetCat and more On Sun, Mar 27, 2011 at 02:23:03PM -0700, Zach C. wrote: > Okay, and also let me rephrase the question: what does your tool do that * > socat* doesn't? Better question ;) scnc is written in Perl, and does not suffer from stack overflows: http://www.dest-unreach.org/socat/ 2010/08/02: A stack overflow vulnerability has been fixed that could be triggered when command line arguments were longer than 512 bytes. Fixed versions are 1.7.1.3 and 2.0.0-b4. See socat security advisory 2 for details. This one is from command line, maybe the next will be in the server mode or whatever. Regards, -- ^ ___ ___ http://www.GomoR.org/ <-+ | / __ |__/ Senior Security Engineer | | \__/ | \ ---[ zsh$ alias psed='perl -pe ' ]--- | +--> Net::Frame <=> http://search.cpan.org/~gomor/ <---+ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists