Lucene search

K
osvGoogleOSV:DSA-2049-1
HistoryMay 23, 2010 - 12:00 a.m.

barnowl - arbitrary code execution

2010-05-2300:00:00
Google
osv.dev
5

0.044 Low

EPSS

Percentile

92.4%

It has been discovered that barnowl, a curses-based tty Jabber, IRC, AIM
and Zephyr client, is prone to a buffer overflow via its “CC:” handling,
which could lead to the execution of arbitrary code.

For the stable distribution (lenny), this problem has been fixed in
version 1.0.1-4+lenny1.

For the testing distribution (squeeze) and the unstable distribution
(sid), this problem has been fixed in version 1.5.1-1.

We recommend that you upgrade your barnowl packages.

CPENameOperatorVersion
barnowleq1.0.1-3
barnowleq1.0.1-4