Bug#330364: helix-player: Helix Player Remote Format String Exploit
Package: helix-player Severity: grave Tags: security Justification: user security hole According to http://www.open-security.org/advisories/13, there is another remote vulnerability in helix player. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12.3-k1 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#330364: helix-player: Helix Player Remote Format String Exploit
This will be helix-player 1.0.6, but that is not public available atm. -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: [EMAIL PROTECTED] Internet: http://people.panthera-systems.net/~daniel-baumann/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#330364: helix-player: Helix Player Remote Format String Exploit
On Tue, Sep 27, 2005 at 08:32:38PM +0200, Stefan Fritsch wrote: According to http://www.open-security.org/advisories/13, there is another remote vulnerability in helix player. Acknowledged. Is there any word about a fix? noah signature.asc Description: Digital signature
Bug#330364: helix-player: Helix Player Remote Format String Exploit
Noah Meyerhans wrote: Acknowledged. Is there any word about a fix? There will be a fixed version, called 1.0.6. As soon as it is available, I will prepare a fixed package both for sid and sarge. -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: [EMAIL PROTECTED] Internet: http://people.panthera-systems.net/~daniel-baumann/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]