BitchX Remote cannot_join_channel() Buffer Overflow Vulnerability
Slackware has released an advisory (SSA:2003-141-02) and fixes. Information about obtaining and applying fixes are available in the referenced advisory.
Debian has released an advisory (DSA 306-1). Information about obtaining and applying fixes are available in the referenced advisory.
Gentoo has released bitchx-1.0.19-r5 which addresses this issue. Users are advised to upgrade by performing the following commands:
Conectiva has released an advisory (CLA-2003:655) and fixes for this issue. Links to fixed packages can be found in the attached advisory. Alternatively, users can use the apt tool:
An unofficial and untested patch has been released by firstname.lastname@example.org.
It has been reported that these issues have been addressed in the current cvs tree.
BitchX IRC Client 1.0 c19
BitchX IRC Client 1.0 c16