Package: cgiirc
Version: 0.5.4
Severity: grave
Tags: security
Justification: user security hole

Upstream has just released 0.5.8, which fixes a buffer overflow in
client.c amongst other things. The 0.5.8 timeline can be seen here:

http://cvs.cgiirc.org/timeline?d=300&e=2006-Apr-30&c=2&px=&s=0&dm=1&x=1&m=1

The patches can be seen here:

http://cvs.cgiirc.org/chngview?cn=283
http://cvs.cgiirc.org/chngview?cn=263

There is no CVE assigned yet as far as I know.

0.5.8 also adds a login secret feature to help stop flooding:

> I have also added a feature which hopefully will stop some of the  
> lamer attacks on CGI:IRC. If you set the 'login secret' option then  
> an authentication token is added to the URL so it is not enough to  
> simply request nph-irc.cgi like some flooding scripts have done.

http://cvs.cgiirc.org/chngview?cn=277

-- 
bye,
pabs

http://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to