Subject: serveez: REMOTE BUFFER OVERFLOW
Package: serveez
Version: 0.1.5-2.1
Severity: grave
Justification: user security hole
Tags: security

*** Please type your report below this line ***

I HAVE FOUND SERIOUS SATANIC SECURITY HOLE:

http://packetstormsecurity.nl/0908-exploits/serveez-overflow.txt

LVAC!

-- System Information:
Debian Release: 5.0.2
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages serveez depends on:
ii  guile-1.6-libs         1.6.8-6.3         Main Guile libraries
ii  libbz2-1.0             1.0.5-1           high-quality block-sorting file co
ii  libc6                  2.7-18            GNU C Library: Shared libraries
ii  libguile-ltdl-1        1.6.8-6.3         Guile's patched version of libtool
ii  libqthreads-12         1.6.8-6.3         QuickThreads library for Guile
ii  libserveez-0.1.5       0.1.5-2.1         GNU Serveez server framework -- sh
ii  zlib1g                 1:1.2.3.3.dfsg-12 compression library - runtime

serveez recommends no packages.

serveez suggests no packages.

-- no debconf information

Attachment: serveez.cfg
Description: Binary data

Reply via email to