openbsd-ports/net/epic4/patches
margarida dd765693ea Security fix:
A remotely exploitable buffer overrun has been reported in Epic.
This issue may reportedly be exploited by a malicious server that
supplies an overly long nickname in a CTCP messages, potentially
allowing for execution of arbitrary code in the context of the
client user.
It may be also be possible for a malicious client to send such a
message, but it is likely that the server will limit the length.

ok brad@
2003-11-13 21:11:11 +00:00
..
patch-doc_epic.1 - disable auto rejoin 2002-06-30 18:23:31 +00:00
patch-include_config.h - disable auto rejoin 2002-06-30 18:23:31 +00:00
patch-source_ctcp_c Security fix: 2003-11-13 21:11:11 +00:00