Date: Wed, 29 Oct 2003 04:01:21 +0800 (CST) From: elvis@sslab.cs.ccu.edu.tw To: FreeBSD-gnats-submit@FreeBSD.org Cc: anders@FreeBSD.org Subject: ports/58648: Message-ID: <20031028200121.D49B885@sslab.cs.ccu.edu.tw> Resent-Message-ID: <200310282010.h9SKAMi9040159@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 58648 >Category: ports >Synopsis: >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 28 12:10:22 PST 2003 >Closed-Date: >Last-Modified: >Originator: elvis >Release: FreeBSD 5.1-RELEASE-p10 i386 >Organization: System Software Lab. CSIE CCU Taiwan >Environment: System: FreeBSD sslab.cs.ccu.edu.tw 5.1-RELEASE-p10 FreeBSD 5.1-RELEASE-p10 #10: Sat Oct 4 14:23:21 CST 2003 root@sslab.cs.ccu.edu.tw:/ftp/obj/usr/src/sys/SSLAB i386 >Description: There's a remote buffer overflow Advisory of thttpd http://www.texonet.com/advisories/TEXONET-20030908.txt Topic "Remote overflow in thttpd" >How-To-Repeat: N/A >Fix: Upgrade to 2.24 http://www.acme.com/software/thttpd/#releasenotes o Fixed buffer overflow bug in defang(). >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031028200121.D49B885>