Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: bitchx (200303-21)
Date: Mon, 24 Mar 2003 11:57:52
Message-Id: 20030324115551.0E2845761@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200303-21
6 - - ---------------------------------------------------------------------
7
8 PACKAGE : bitchx
9 SUMMARY : buffer overflow
10 DATE : 2003-03-24 11:56 UTC
11 EXPLOIT : remote
12 VERSIONS AFFECTED : <1.0.19-r5
13 FIXED VERSION : >=1.0.19-r5
14 CVE :
15
16 - - ---------------------------------------------------------------------
17
18 - From advisory:
19
20 "Full of sprintf() calls and relying on BIG_BUFFER_SIZE being large
21 enough. There's multiple ways to exploit it by giving
22 near-BIG_BUFFER_SIZE strings in various places."
23
24 Read the full advisory at:
25 http://marc.theaimsgroup.com/?l=bugtraq&m=104766521328322&w=2
26
27 SOLUTION
28
29 It is recommended that all Gentoo Linux users who are running
30 net-irc/bitchx upgrade to bitchx-1.0.19-r5 as follows:
31
32 emerge sync
33 emerge bitchx
34 emerge clean
35
36 - - ---------------------------------------------------------------------
37 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
38 - - ---------------------------------------------------------------------
39 -----BEGIN PGP SIGNATURE-----
40 Version: GnuPG v1.2.1 (GNU/Linux)
41
42 iD8DBQE+fvKBfT7nyhUpoZMRAuzlAKCOUEKFF4kgEMzoR764HVGxrjstQQCgqYyq
43 t4OtjEq/D2dO+c6jFlBnPug=
44 =Jz7V
45 -----END PGP SIGNATURE-----