From: | Patrick Lauer <gentoo@×××××××××××××.de> |
---|---|
To: | gentoo-dev@g.o |
Subject: | [gentoo-dev] Security Problems: xmule, lmule |
Date: | Tue, 19 Aug 2003 22:47:40 |
Message-Id: | 1061333257.14174.2.camel@localhost |
1 | Hi, |
2 | |
3 | yesterday I found this: |
4 | http://www.heise.de/newsticker/data/dab-18.08.03-000/ (in german) |
5 | |
6 | http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html |
7 | (english) |
8 | |
9 | short summary: |
10 | all emule, lmule and xmule versions are vulnerable to buffer overflows |
11 | including execution of malicious code. |
12 | |
13 | xmule 1.4.3 (portage current) is very vulnerable. |
14 | xmule 1.5.6 (latest from xmule website) does not fix all known |
15 | vulnerabilities. |
16 | |
17 | Please discourage the use of lmule and xmule until fixed versions are |
18 | available. |
19 | |
20 | With best regards, |
21 | Patrick "bonsaikitten" Lauer |
22 | |
23 | |
24 | -- |
25 | gentoo-dev@g.o mailing list |
Subject | Author |
---|---|
Re: [gentoo-dev] Security Problems: xmule, lmule | Rainer Groesslinger <scandium@g.o> |
Re: [gentoo-dev] Security Problems: xmule, lmule | Rainer Groesslinger <scandium@g.o> |