diff options
author | recht <recht@pkgsrc.org> | 2004-01-27 01:24:51 +0000 |
---|---|---|
committer | recht <recht@pkgsrc.org> | 2004-01-27 01:24:51 +0000 |
commit | 3805856b7356c13ff71687dc3711f6ce671a75c2 (patch) | |
tree | 5a8711c3298cfac4d114d3c6445f292a455de426 /doc | |
parent | 18a916d5e6481b140ffb5e120e09d36645a44a11 (diff) | |
download | pkgsrc-3805856b7356c13ff71687dc3711f6ce671a75c2.tar.gz |
12 vulnerabilities were found in the instant messenger GAIM that allow remote compromise.
The 12 identified problems range from simple standard stack overflows, over heap overflows to an integer overflow that can be abused to cause a heap overflow. Due to the nature of instant messaging some of these bugs require man-in-the-middle attacks between client and server. But the underlying protocols are easy to implement and MIM attacks on ordinary TCP sessions is afairly simple task.
Please see http://security.e-matters.de/advisories/012004.html
for more details.
Apply the fix posted in that advisory (originally by the FreeBSD security
team) and bump PKGREVISION to 1.
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions