Package: gopher Severity: grave Version: 3.0.10 Tags: security Buffer overflows have been found in the gopher client that can lead to remote code execution when connecting to malicious gopher servers. This bugtraq post is about version 3.0.9, but it doesn't seem to be fixed in 3.0.10:
http://marc.theaimsgroup.com/?l=bugtraq&m=112559902931614&w=2 This is CAN-2005-2772. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.4.27 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- see shy jo
signature.asc
Description: Digital signature