Package: sam2p Version: 0.49.2 - 0.49.4 project link: https://github.com/pts/sam2p
There are several vulnerabilites in sam2p 0.49.2 - 0.49.4, like heap-based buffer overflows, null pointer dereference have been found. All of them can lead to a denial of service attack. the details of vulnerabilites are below links: https://github.com/pts/sam2p/issues/18 https://github.com/pts/sam2p/issues/19 https://github.com/pts/sam2p/issues/20 https://github.com/pts/sam2p/issues/21 https://github.com/pts/sam2p/issues/22 https://github.com/pts/sam2p/issues/23 https://github.com/pts/sam2p/issues/24 https://github.com/pts/sam2p/issues/25 https://github.com/pts/sam2p/issues/26 https://github.com/pts/sam2p/issues/27 https://github.com/pts/sam2p/issues/28 https://github.com/pts/sam2p/issues/29 https://github.com/pts/sam2p/issues/30 https://github.com/pts/sam2p/issues/31 https://github.com/pts/sam2p/issues/32 https://github.com/pts/sam2p/issues/33 I am using Debian 7.5 "Wheezy", libc.7 ,gcc 5.4.0. name:liu zhu mail:fantasy7...@hotmail.com