Bug#226356: Buffer overflow vulnerability (CAN-2003-0850)
"The TCP reassembly functionality in libnids before 1.18 allows remote
attackers to cause "memory corruption" and possibly execute arbitrary code
via "overlarge TCP packets."
An update to version 1.18 should be sufficient to correct the problem.
I am copying email@example.com, since that is the only reverse
dependency. This package is orphaned and could be removed if this bug is
-- System Information:
Debian Release: unstable
Kernel: Linux mizar 2.4.22-deb5-evms2.1.1-skas3-1 #1 Mon Dec 22 14:08:31 PST 2003 i686
Locale: LANG=en_US, LC_CTYPE=en_US