Subject: pkg/11999: chat/micq: Remote exploitable buffer overflow -- FORBIDDEN sugestion
To: None <gnats-bugs@gnats.netbsd.org>
From: Tomasz Luchowski <zuntum@eik.pl>
List: netbsd-bugs
Date: 01/19/2001 01:35:16
>Number: 11999
>Category: pkg
>Synopsis: chat/micq: Remote exploitable buffer overflow -- FORBIDDEN sugestion
>Confidential: yes
>Severity: serious
>Priority: high
>Responsible: pkg-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Fri Jan 19 01:38:00 PST 2001
>Closed-Date:
>Last-Modified:
>Originator: zuntum
>Release: 1.5.1_ALPHA
>Organization:
/* [zuntum] zuntum@eik.pl , [WWW] http://zuntum.eik.pl */
>Environment:
System: NetBSD flis 1.5.1_ALPHA NetBSD 1.5.1_ALPHA (FLIS) #1: Wed Nov 22 07:25:41 CET 2000 zuntum@flis:/usr/src/sys/arch/i386/compile/FLIS i386
Architecture: i386
Machine: i386
>Description:
FreeBSD marked chat/micq as FORBIDDEN:
Remotely exploitable buffer overflow; FORBIDDEN.
Submitted by: recidjvo <recidjvo@pkcrew.org> via Bugtraq
I didn't test it, I'm pretty sure that it affects our package, too.
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted: