From owner-freebsd-security Sun Dec 10 8:21:16 2000 From owner-freebsd-security@FreeBSD.ORG Sun Dec 10 08:21:14 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from 214.norrgarden.se (214.norrgarden.se [195.100.133.214]) by hub.freebsd.org (Postfix) with ESMTP id AA4E637B400 for ; Sun, 10 Dec 2000 08:21:12 -0800 (PST) Received: (from cj@localhost) by 214.norrgarden.se (8.11.1/8.11.1) id eBAGKq500447; Sun, 10 Dec 2000 17:20:52 +0100 (CET) (envelope-from cj) From: Carl Johan Madestrand Date: Sun, 10 Dec 2000 17:20:51 +0100 X-Mailer: KMail [version 1.1.99] Content-Type: text/plain; charset="US-ASCII" Cc: To: Roman Shterenzon , References: In-Reply-To: Subject: Re: Buffer vulnerability in BitchX irc client MIME-Version: 1.0 Message-Id: <00121017205100.00265@214.norrgarden.se> Content-Transfer-Encoding: 8bit Sender: cj@214.norrgarden.se Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Sunday 10 December 2000 13:36, Roman Shterenzon wrote: > Hi, > Aparently securityfocus has some information about this: > http://www.securityfocus.com/bid/2087 > > There are some explanations in the helot.c - the exploit. > > P.S. Maintainer, can you hear me? :) > > --Roman Shterenzon, UNIX System Administrator and Consultant > [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] I hear you. I received a patch for misc.c today from someone which apparently is supposed to fix the problem. -- Carl Johan Madestrand LoRd_CJ on IRC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message