[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Update to emule/xmule/lmule vulnerabilities.
- To: full-disclosure@lists.netsys.com
- Subject: [Full-Disclosure] Update to emule/xmule/lmule vulnerabilities.
- From: Stefan Esser <s.esser@e-matters.de>
- Date: Mon, 18 Aug 2003 13:56:49 +0200
Hello,
obviously there is another widely used emule clone called
emule+ that shares parts of the emule codebase. It was
repeatedly asked if it is also vulnerable.
It should be vulnerable to bugs (1)-(3) of my advisory.
But from a quick inspection it seems that bug (4) was
already catched by an additional condition in an If clause.
Stefan Esser
--
--------------------------------------------------------------------------
Stefan Esser s.esser@e-matters.de
e-matters Security http://security.e-matters.de/
GPG-Key gpg --keyserver pgp.mit.edu --recv-key 0xCF6CAE69
Key fingerprint B418 B290 ACC0 C8E5 8292 8B72 D6B0 7704 CF6C AE69
--------------------------------------------------------------------------
Did I help you? Consider a gift: http://wishlist.suspekt.org/
--------------------------------------------------------------------------
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html