Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Dec 2000 17:20:51 +0100
From:      Carl Johan Madestrand <cj@vallcom.net>
To:        Roman Shterenzon <roman@xpert.com>, <freebsd-security@freebsd.org>
Cc:        <cj@vallcom.net>
Subject:   Re: Buffer vulnerability in BitchX irc client
Message-ID:  <00121017205100.00265@214.norrgarden.se>
In-Reply-To: <Pine.LNX.4.30.0012101434070.31366-100000@jamus.xpert.com>
References:  <Pine.LNX.4.30.0012101434070.31366-100000@jamus.xpert.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sunday 10 December 2000 13:36, Roman Shterenzon wrote:
> Hi,
> Aparently securityfocus has some information about this:
> http://www.securityfocus.com/bid/2087
>
> There are some explanations in the helot.c - the exploit.
>
> P.S. Maintainer, can you hear me? :)
>
> --Roman Shterenzon, UNIX System Administrator and Consultant
> [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ]

I hear you. I received a patch for misc.c today from someone which apparently 
is supposed to fix the problem.
-- 
Carl Johan Madestrand <cj@vallcom.net>
LoRd_CJ on IRC


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00121017205100.00265>