Mandriva Linux Security Advisory - A stack-based buffer overflow was found in mtr prior to version 0.73 that allowed remote attackers to execute arbitrary code via a crafted DNS PTR record, when called with the --split option. The updated packages provide mtr 0.73 which corrects this issue.
da54910e94b149a4e4c7c1aa6a98b994bb8ac622cfe5e54f33cf1fa58d9c5d49
Gentoo Linux Security Advisory GLSA 200806-01 - Adam Zabrocki reported a boundary error within the split_redraw() function in the file split.c, possibly leading to a stack-based buffer overflow. Versions less than 0.73-r1 are affected.
414fca87f1f0d02364890b4e35a28616e977900a8f6218104885544e9c2c462f
Debian Security Advisory 1587-1 - Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records.
5186c84f13a7d6b4ce1dd045ce14f9d415f82dc1c42b0407ebee613c3d317e44