Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Dec 2000 11:42:47 -0600 (CST)
From:      Matt Watson <sideshow@terahertz.net>
To:        Roman Shterenzon <roman@xpert.com>
Cc:        freebsd-security@FreeBSD.ORG, cj@vallcom.net
Subject:   Re: Buffer vulnerability in BitchX irc client
Message-ID:  <Pine.BSF.4.21.0012101140360.72996-100000@venus.terahertz.net>
In-Reply-To: <Pine.LNX.4.30.0012101434070.31366-100000@jamus.xpert.com>

next in thread | previous in thread | raw e-mail | index | archive | help
This bug is already known to the bitchx coders and has already been
patched in the CVS.  Shortly i will be posting the patches for 75p3 and
1.0c17 on www.bitchx.org and ftp.bitchx.org as soon as i get my hands on
them.  I'm not the maintainers of the port but I do run the bitchx.org
sites, so, should the port be downloading from ftp.bitchx.org there will
be no need to include a special patch in the port.

-- Matt Watson
   TeraHertz Communications 

On Sun, 10 Dec 2000, Roman Shterenzon wrote:

> Hi,
> Aparently securityfocus has some information about this:
> http://www.securityfocus.com/bid/2087
> 
> There are some explanations in the helot.c - the exploit.
> 
> P.S. Maintainer, can you hear me? :)
> 
> --Roman Shterenzon, UNIX System Administrator and Consultant
> [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ]
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0012101140360.72996-100000>