From owner-freebsd-security Sun Dec 10 4:37: 5 2000 From owner-freebsd-security@FreeBSD.ORG Sun Dec 10 04:37:04 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from jamus.xpert.com (jamus.xpert.com [199.203.132.17]) by hub.freebsd.org (Postfix) with ESMTP id C14D237B400 for ; Sun, 10 Dec 2000 04:37:02 -0800 (PST) Received: from roman (helo=localhost) by jamus.xpert.com with local-esmtp (Exim 3.12 #5) id 1455io-0008AV-00; Sun, 10 Dec 2000 14:36:54 +0200 Date: Sun, 10 Dec 2000 14:36:54 +0200 (IST) From: Roman Shterenzon To: Cc: Subject: Buffer vulnerability in BitchX irc client Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi, Aparently securityfocus has some information about this: http://www.securityfocus.com/bid/2087 There are some explanations in the helot.c - the exploit. P.S. Maintainer, can you hear me? :) --Roman Shterenzon, UNIX System Administrator and Consultant [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message