---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: netKar Two Vulnerabilities SECUNIA ADVISORY ID: SA39387 VERIFY ADVISORY: http://secunia.com/advisories/39387/ DESCRIPTION: Luigi Auriemma has reported two vulnerabilities in netKar, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. 1) A boundary error in the processing of JOIN requests can be exploited to cause a stack-based buffer overflow by sending a specially crafted request to the server. Successful exploitation may allow execution of arbitrary code. 2) A NULL-pointer dereference error in the creation of user files can be exploited to cause a crash by sending a specially crafted request to the server. The vulnerabilities are reported in version 1.1. Other versions may also be affected. SOLUTION: Use the product only in a trusted network environment. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/netkarbof-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------