Subject: pkg/11999: chat/micq: Remote exploitable buffer overflow -- FORBIDDEN sugestion
To: None <gnats-bugs@gnats.netbsd.org>
From: Tomasz Luchowski <zuntum@eik.pl>
List: netbsd-bugs
Date: 01/19/2001 01:35:16
>Number:         11999
>Category:       pkg
>Synopsis:       chat/micq: Remote exploitable buffer overflow -- FORBIDDEN sugestion
>Confidential:   yes
>Severity:       serious
>Priority:       high
>Responsible:    pkg-manager
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Fri Jan 19 01:38:00 PST 2001
>Closed-Date:
>Last-Modified:
>Originator:     zuntum
>Release:        1.5.1_ALPHA
>Organization:
/* [zuntum] zuntum@eik.pl , [WWW] http://zuntum.eik.pl */
>Environment:
	
System: NetBSD flis 1.5.1_ALPHA NetBSD 1.5.1_ALPHA (FLIS) #1: Wed Nov 22 07:25:41 CET 2000 zuntum@flis:/usr/src/sys/arch/i386/compile/FLIS i386
Architecture: i386
Machine: i386
>Description:
	FreeBSD marked chat/micq as FORBIDDEN:

	Remotely exploitable buffer overflow; FORBIDDEN.
	Submitted by:	recidjvo <recidjvo@pkcrew.org> via Bugtraq

	I didn't test it, I'm pretty sure that it affects our package, too.

	
>How-To-Repeat:
	
>Fix:
	
>Release-Note:
>Audit-Trail:
>Unformatted: