Patch available for high risk flaws in the AtHoc Toolbar

From: NGSSoftware Insight Security Research (nisr_at_NEXTGENSS.COM)
Date: 10/06/04

  • Next message: Castigliola, Angelo: "Darn if you do Darn if you don't."
    Date:         Wed, 6 Oct 2004 17:55:11 +0100

    Mark Litchfield and John Heasman of NGSSoftware have discovered two high
    risk vulnerabilities in the AtHoc Toolbar. The AtHoc toolbar is a plugin for
    Microsoft's Internet Explorer. The toolbar is redistributed to users of

    Juniper Networks
    Agile PLM

    The flaws, that include a remotely exploitable buffer overflow and a format
    string bug, have been fixed by AtHoc and an updated toolbar has been
    distributed to the affected companies. Clients of any of the companies
    listed above that have installed the toolbar should ensure that they
    download the updated version.

    NGSSoftware are going to withhold details about these flaws for three
    months. Full details will be published on the 6th of January 2005. This
    three month window will allow users of the toolbar the time needed to obtain
    the updated version before the details are released to the general public.
    This reflects NGSSoftware's new approach to responsible disclosure.

    NGSSoftware Insight Security Research
    +44(0)208 401 0070

    NTBugtraq Editor's Note:
    Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.

  • Next message: Castigliola, Angelo: "Darn if you do Darn if you don't."