Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Gentoo 200303-21: buffer overflow in bitchx

Gentoo 200303-21: buffer overflow in bitchx

by Nikola Strahija on March 25th, 2003 A vulnerability has been found in the "BIG_BUFFER_SIZE strings in various places of bitchx IRC client, versions 1.0.19-r5 and prior.


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-21
- - ---------------------------------------------------------------------

PACKAGE : bitchx
SUMMARY : buffer overflow
DATE : 2003-03-24 11:56 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <1.0.19-r5
FIXED VERSION : >=1.0.19-r5
CVE :

- - ---------------------------------------------------------------------

- From advisory:

"Full of sprintf() calls and relying on BIG_BUFFER_SIZE being large
enough. There's multiple ways to exploit it by giving
near-BIG_BUFFER_SIZE strings in various places."

Read the full advisory at:
http://marc.theaimsgroup.com/?l=bugtraq&m=104766521328322&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-irc/bitchx upgrade to bitchx-1.0.19-r5 as follows:

emerge sync
emerge bitchx
emerge clean

- - ---------------------------------------------------------------------
[email protected] - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »