Subject: serveez: REMOTE BUFFER OVERFLOW Package: serveez Version: 0.1.5-2.1 Severity: grave Justification: user security hole Tags: security
*** Please type your report below this line *** I HAVE FOUND SERIOUS SATANIC SECURITY HOLE: http://packetstormsecurity.nl/0908-exploits/serveez-overflow.txt LVAC! -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages serveez depends on: ii guile-1.6-libs 1.6.8-6.3 Main Guile libraries ii libbz2-1.0 1.0.5-1 high-quality block-sorting file co ii libc6 2.7-18 GNU C Library: Shared libraries ii libguile-ltdl-1 1.6.8-6.3 Guile's patched version of libtool ii libqthreads-12 1.6.8-6.3 QuickThreads library for Guile ii libserveez-0.1.5 0.1.5-2.1 GNU Serveez server framework -- sh ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime serveez recommends no packages. serveez suggests no packages. -- no debconf information
serveez.cfg
Description: Binary data