Processed: Re: Bug#306454: maxdb-7.5.00: Three remotely exploitable buffer overflows in MaxDB

2005-04-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 306454 + pending
Bug#306454: maxdb-7.5.00: Three remotely exploitable buffer overflows in MaxDB
Tags were: security
Tags added: pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#306454: maxdb-7.5.00: Three remotely exploitable buffer overflows in MaxDB

2005-04-26 Thread Moritz Muehlenhoff
Package: maxdb-7.5.00
Severity: grave
Tags: security
Justification: user security hole

Three remotely exploitable buffer overflows in various parts of MaxDB
have been reported by iDefense. Please see their advisories for details:

http://www.idefense.com/application/poi/display?id=236&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=234&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=235&type=vulnerabilities

All issues have been fixed in 7.5.00.26

Cheers,
Moritz

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]