It has been reported that unix2tcp may be prone to a buffer overflow condition, which may allow an attacker to gain unauthorized access to a vulnerable system. The issue is caused due to insufficient boundary checking in the 'unix2tcp.c' module. unix2tcp versions 0.7.2 and prior may be vulnerable to this issue. This BID will be updated as more information becomes available.
It has been reported that unix2tcp may be prone to a buffer overflow condition, which may allow an attacker to gain unauthorized access to a vulnerable system. The issue is caused due to insufficient boundary checking in the 'unix2tcp.c' module. unix2tcp versions 0.7.2 and prior may be vulnerable to this issue. This BID will be updated as more information becomes available.