summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorrecht <recht@pkgsrc.org>2004-01-27 01:24:51 +0000
committerrecht <recht@pkgsrc.org>2004-01-27 01:24:51 +0000
commit3805856b7356c13ff71687dc3711f6ce671a75c2 (patch)
tree5a8711c3298cfac4d114d3c6445f292a455de426 /doc
parent18a916d5e6481b140ffb5e120e09d36645a44a11 (diff)
downloadpkgsrc-3805856b7356c13ff71687dc3711f6ce671a75c2.tar.gz
12 vulnerabilities were found in the instant messenger GAIM that allow remote compromise.
The 12 identified problems range from simple standard stack overflows, over heap overflows to an integer overflow that can be abused to cause a heap overflow. Due to the nature of instant messaging some of these bugs require man-in-the-middle attacks between client and server. But the underlying protocols are easy to implement and MIM attacks on ordinary TCP sessions is afairly simple task. Please see http://security.e-matters.de/advisories/012004.html for more details. Apply the fix posted in that advisory (originally by the FreeBSD security team) and bump PKGREVISION to 1.
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions