"[A] carefully crafted format string passed to sprintf can cause a buffer overflow. This buffer overflow can then be used by an attacker to execute code on the machine."
A patch is available. More information: <http://www.perlfoundation.org/news/2005/sprintf_patch_released.html> Regards, Tim -- http://linuxfromscratch.org/mailman/listinfo/lfs-security FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page
