Re: PFinger 0.7.8 format string vulnerability (#NISR16122002B)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 16 Dec 2002 19:55:05 -0000
"NGSSoftware Insight Security Research" <nisr@nextgenss.com> wrote:

> NGSSoftware Insight Security Research Advisory
> 
> Name: PFinger Format String vulnerability
> Systems: PFinger version 0.7.8 and earlier
> Severity: High Risk
> Vendor URL: http://www.xelia.ch/unix/pfinger/
> Author: David Litchfield (david@ngssoftware.com)
> Advisory URL: http://www.ngssoftware.com/advisories/pfinger.txt
> Date: 16th December 2002
> Advisory number: #NISR16122002B

For those who haven't noticed:
The author has fixed the bug and released a new version 0.7.9

Best regards
	Andreas
-- 
Andreas Tscharner                                  starfire@dplanet.ch
----------------------------------------------------------------------
"Programming today is a race between software engineers striving to
build bigger and better idiot-proof programs, and the Universe trying
to produce bigger and better idiots. So far, the Universe is winning."
                                                          -- Rich Cook 

Attachment: pgp00259.pgp
Description: PGP signature


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux