Package: gopher
Severity: grave
Version: 3.0.10
Tags: security

Buffer overflows have been found in the gopher client that can lead to
remote code execution when connecting to malicious gopher servers. This
bugtraq post is about version 3.0.9, but it doesn't seem to be fixed in
3.0.10:

http://marc.theaimsgroup.com/?l=bugtraq&m=112559902931614&w=2

This is CAN-2005-2772.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to