Package: irssi-text
Version: 0.8.10-2
Severity: normal
Tags: patch

I think the information provided via CTCP VERSION is excessive.  Kernel and cpu
platform is precisely the information an attacker would need to insert shellcode
in case a vulnerability is discovered.

Please consider reducing it:

--- irssi-0.8.10/src/irc/core/ctcp.c~   2005-12-08 18:32:48.000000000 +0100
+++ irssi-0.8.10/src/irc/core/ctcp.c    2006-06-12 20:45:33.451706184 +0200
@@ -329,7 +329,7 @@
        ctcp_cmds = NULL;

        settings_add_str("misc", "ctcp_version_reply",
-                        PACKAGE" v$J - running on $sysname $sysarch");
+                        PACKAGE" v$J");
        settings_add_str("misc", "ctcp_userinfo_reply", "$Y");
        settings_add_int("flood", "max_ctcp_queue", 5);


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-12-amd64-k8
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)

Versions of packages irssi-text depends on:
ii  irssi                         0.8.10-2   terminal based IRC client

irssi-text recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to