From owner-freebsd-security Sun Dec 10 9:49:55 2000 From owner-freebsd-security@FreeBSD.ORG Sun Dec 10 09:49:52 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from venus.terahertz.net (venus.terahertz.net [208.137.7.240]) by hub.freebsd.org (Postfix) with ESMTP id 71D8C37B400 for ; Sun, 10 Dec 2000 09:49:52 -0800 (PST) Received: from localhost (sideshow@localhost) by venus.terahertz.net (8.9.3/8.9.3) with ESMTP id LAA73013; Sun, 10 Dec 2000 11:42:48 -0600 (CST) Date: Sun, 10 Dec 2000 11:42:47 -0600 (CST) From: Matt Watson To: Roman Shterenzon Cc: freebsd-security@FreeBSD.ORG, cj@vallcom.net Subject: Re: Buffer vulnerability in BitchX irc client In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org This bug is already known to the bitchx coders and has already been patched in the CVS. Shortly i will be posting the patches for 75p3 and 1.0c17 on www.bitchx.org and ftp.bitchx.org as soon as i get my hands on them. I'm not the maintainers of the port but I do run the bitchx.org sites, so, should the port be downloading from ftp.bitchx.org there will be no need to include a special patch in the port. -- Matt Watson TeraHertz Communications On Sun, 10 Dec 2000, Roman Shterenzon wrote: > Hi, > Aparently securityfocus has some information about this: > http://www.securityfocus.com/bid/2087 > > There are some explanations in the helot.c - the exploit. > > P.S. Maintainer, can you hear me? :) > > --Roman Shterenzon, UNIX System Administrator and Consultant > [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message