lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200304081212.h38CC5Rj050424@freefall.freebsd.org>
From: security-advisories at freebsd.org (FreeBSD Security Advisories)
Subject: FreeBSD Security Notice FreeBSD-SN-03:02

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=============================================================================
FreeBSD-SN-03:02                                              Security Notice
                                                          The FreeBSD Project

Topic:          security issue in SETI@...e client
Announced:      2003-04-08

I.   Introduction

A port in the FreeBSD Ports Collection is affected by a security
issue.  Summary information is given below with references and
affected versions.  All versions given refer to the FreeBSD
port/package version numbers.  The listed vulnerabilities are not
specific to FreeBSD unless otherwise noted.

This port is not installed by default, nor is it ``part of FreeBSD''
as such.  The FreeBSD Ports Collection contains thousands of
third-party applications in a ready-to-install format.  FreeBSD makes
no claim about the security of these third-party applications.  See
<URL:http://www.freebsd.org/ports/> for more information about the
FreeBSD Ports Collection.

II.  Ports

+------------------------------------------------------------------------+
Port name:      astro/setiathome
Affected:       All versions
Status:         Not fixed

Excerpt from Berend-Jan Wever a.k.a. SkyLined's advisory:
``There is a bufferoverflow in the server responds handler. Sending
an overly large string followed by a newline ('\n') character to the
client will trigger this overflow. This has been tested with various
versions of the client. All versions are presumed to have this flaw in
some form.''
Example exploits for FreeBSD and other systems exist.
A new version of SETI@...e for FreeBSD is not available at the time
of this security notice.

<URL: http://spoor12.edup.tudelft.nl/ >
<URL: http://setiathome.berkeley.edu/version308.html >
+------------------------------------------------------------------------+

FreeBSD Security Notices are communications from the Security Officer
intended to inform the user community about potential security issues,
such as bugs in the third-party applications found in the Ports
Collection, which will not be addressed in a FreeBSD Security
Advisory.

Feedback on Security Notices is welcome at <security-team@...eBSD.org>.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQE+kruuFdaIBMps37IRAksIAKCXua4QQz3P3Y4qysYW8/ftjQhozQCfVnNw
PZAo0yzuFpYydTgYrodW+4Q=
=DQki
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-security-notifications@...ebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
To unsubscribe, send any mail to "freebsd-security-notifications-unsubscribe@...ebsd.org"


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ