Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Slackware SSA:2003-141-01: EPIC4 buffer overflow

Slackware SSA:2003-141-01: EPIC4 buffer overflow

by Nikola Strahija on May 22nd, 2003 A buffer overflow vulnerability has been found in EPIC4 IRC client, which, if exploited, could lead to arbitrary code execution or EPIC4 client crash.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] EPIC4 security fixes (SSA:2003-141-01)

New EPIC4 packages are available to fix security problems found
by Timo Sirainen. EPIC4 is an IRC (Internet Relay Chat) client.
Under certain circumstances, a malicious IRC server could cause
EPIC4 to crash, or possibly to run arbitrary code as the user
running EPIC4.

All sites running EPIC4 are advised to upgrade.

More information on the problem can be found here:

Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue May 20 20:13:09 PDT 2003
patches/packages/epic4-1.0.1-i386-3.tgz: Patched a buffer overflow in ctcp.c.
(* Security fix *)
+--------------------------+



WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/epic4-1.0.1-i386-3.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/epic4-1.0.1-i386-3.tgz



MD5 SIGNATURES:
+-------------+

Slackware 8.1 package:
4593af7c875770e1eadbb00b39b1de7a epic4-1.0.1-i386-3.tgz

Slackware 9.0 package:
9b3a389255484d9a2ff7ea0e8caacbc4 epic4-1.0.1-i386-3.tgz



INSTALLATION INSTRUCTIONS:
+------------------------+

Upgrade using upgradepkg (as root):

upgradepkg epic4-1.0.1-i386-3.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
[email protected]

+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: |
+------------------------------------------------------------------------+
| Send an email to [email protected] with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back. Follow the instructions to |
| complete the unsubscription. Do not reply to this message to |
| unsubscribe! |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+zBCIakRjwEAQIjMRAuc1AJ9BrW1clMi18D/bavKGgP2aQPzuYACaAvYU
Fl48EC5MsrN2Yd2r3ZFj9gs=
=oqr8
-----END PGP SIGNATURE-----


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »