Package: hashcash
Severity: grave
Tags: security
Justification: user security hole


Format string vulnerability in Hashcash 1.x allows remote attackers
to cause a denial of service (memory consumption) and possibly execute
arbitrary code via format string specifiers in a reply address, which
is not properly handled when printing the header.

See
http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml
http://secunia.com/advisories/14487

Patch is at
http://bugs.gentoo.org/show_bug.cgi?id=83541


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to