lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: bugtraq at beej.org (Marc Bejarano) Subject: Re: Advisory 02/2004: Trillian remote overflows At 14:52 2/24/2004, Stefan Esser wrote: > Severity: 2 vulnerabilities were found in the instant > messenger Trillian that allow remote compromise > Risk: Critical >Vendor Status: Vendor has fixed and released patches > Reference: http://security.e-matters.de/advisories/022004.html while the patch has been released, the "Check for updates on load" option isn't working for me as expected with Trillian 0.74 w/ Patch F. i am not notified of the new patch on startup :( marc