lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040317172536.10026.qmail@www.securityfocus.com> Date: 17 Mar 2004 17:25:36 -0000 From: David <david@...plemachines.org> To: bugtraq@...urityfocus.com Subject: Re: YabbSE (3 on 1) In-Reply-To: <001701c3ff72$1270c1c0$461e5a0a@...anet69> Hi, Developers were never contacted regarding this vulnerability. Currently the solution would be for users to upgrade to SMF version 1.0 Public Beta 4. YaBB SE development has ended and a fix will not be released. We consider SMF a logical upgrade path and the vulnerability is not reproducible in it. While SMF is technically beta software it is considered very stable in terms of how beta software goes. David Recordon Project Manager Simple Machines david@...plemachines.org http://www.simplemachines.org