Date: Sun, 10 Dec 2000 14:36:54 +0200 (IST) From: Roman Shterenzon <roman@xpert.com> To: <freebsd-security@freebsd.org> Cc: <cj@vallcom.net> Subject: Buffer vulnerability in BitchX irc client Message-ID: <Pine.LNX.4.30.0012101434070.31366-100000@jamus.xpert.com>
next in thread | raw e-mail | index | archive | help
Hi, Aparently securityfocus has some information about this: http://www.securityfocus.com/bid/2087 There are some explanations in the helot.c - the exploit. P.S. Maintainer, can you hear me? :) --Roman Shterenzon, UNIX System Administrator and Consultant [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.30.0012101434070.31366-100000>