You have already fixed it, haven't you? ;)
On Wed, Jan 16, 2013 at 3:53 PM, Theppitak Karoonboonyanan
t...@linux.thai.net wrote:
So, it's still possible to exploit by explicitly invoking swath mule mode
in some scripts or so. I think I'll fix this.
Yes, you should get the latest Version to the repository.
On Wed, Jan 16, 2013 at 4:57 PM, Theppitak Karoonboonyanan
t...@linux.thai.net wrote:
On Wed, Jan 16, 2013 at 10:55 PM, Dominik Maier domen...@gmail.com
wrote:
You have already fixed it, haven't you? ;)
I mean, with Debian upload
Dominik Maier
Am 15.01.2013 09:26 schrieb Theppitak Karoonboonyanan t...@linux.thai.net
:
On Tue, Jan 15, 2013 at 6:44 AM, Dominik Maier domen...@gmail.com wrote:
Buffer overflow because of strcpy with possibility to inject shellcode:
swath mule -b [More than 20 to overflow and possibly
Package: swath
Version: 0.4.0-4
Buffer overflow because of strcpy with possibility to inject shellcode:
swath mule -b [More than 20 to overflow and possibly inject shellcode.]
emptyfile
proplematic lines are:
char stopstr[20];
if (muleMode)
strcpy(stopstr,wbr);
Instead, you should
4 matches
Mail list logo