Bug#278190: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Just for references, this issue has been assigned CAN-2005-0079. A Debian advisory will follow. Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#278190: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Justin Pryzby wrote: > reopen 278191 > tag 278191 woody > thanks > > Correct? In generall yes and only if the security team is contacted in parallel, but please close them as I surely forget this. Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please al

Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Justin Pryzby wrote: > Bug#278191: CAN-2005-0079: authentication bypass via integer overflow > > > Its not an integer overflow, btw, though its not really a buffer > overflow either; its an set-an-arbitrary-byte-of-memory-to-zer

Bug#131414: Broken description

2002-01-29 Thread Martin Schulze
Package: clime Version: 1.14.3.20010912cvs-1.1 The description for this package says: |Description: Library to provide basic features about message for Emacsen (Mule2.3) | CLIME is FLIM for Mule2.3. | FLIM is a library to provide basic features about message | representation or encoding for Emac

Bug#146175: netspades - Description improvement

2002-05-07 Thread Martin Schulze
Package: netspades Version: current Severity: minor - Description: server/client spades system + Description: Client/Server spades system Regards, Joey -- GNU does not eliminate all the world's problems, only some of them. -- The GNU Mani

Bug#187481: moxftp arbitrary code execution poc/advisory

2003-04-03 Thread Martin Schulze
Package: moxftp Version: 2.2-18 Severity: grave Tags: security Unfortunately I am currently unable to discover the real problem behind this potential exploit. I'm not even sure if it works on Linux. FreeBSD people simply marked this package FORBIDDEN, but didn't fix the problem either. *sigh*

Bug#188225: Buffer overflows in EPIC

2003-04-08 Thread Martin Schulze
epic-3.004/debian/changelog +++ epic-3.004/debian/changelog @@ -1,3 +1,12 @@ +epic (3.004-17.1) stable-security; urgency=high + + * Non-maintainer upload by the Security Team + * Applied upstream ircII patch partially to fix problems reported by +Timo Sirainen <[EMAIL PROTECTED]> + * Added bui

Security Warning

2003-04-09 Thread Martin Schulze
[Additional notice in case you are filtering debian-bugs somewhere else than your inbox.] Hi, I've opened a security related bug report for ircII, BitchX, EPIC and EPIC4 after Timo Sirainen discovered several bugs in them. The bug report contains a patch against the version in woody, which hopefu

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-11-01 Thread Martin Schulze
Steve Kemp wrote: > On Fri, Oct 29, 2004 at 10:12:33PM +0200, Frank Lichtenheld wrote: > > > Perhaps someone with a little more experience in identifying security > > problems should take a look, too. I CC'ed debian-security. > > Here's a quick summery : > > To be clear there are three flaws