TCH-Rob Posted March 9, 2006 Posted March 9, 2006 The Bat! is prone to a remote buffer-overflow vulnerability. This issue is due to a failure in the application to perform proper bounds checking on user-supplied data before storing it in a finite-sized buffer. An attacker can exploit this issue to control program flow and execute arbitrary attacker-supplied code in the context of the victim user running the affected application. Quote
Deverill Posted March 9, 2006 Posted March 9, 2006 Not The Bat! too! Is nothing sacred? Thanks for the head's up, Rob. Quote
TCH-Bruce Posted March 9, 2006 Posted March 9, 2006 That's actually the second time. Here's the first. Quote
Madmanmcp Posted March 9, 2006 Posted March 9, 2006 Hey, I've heard of that program Twice in one month, at this rate the free publicity should swell the user ranks to almost double what they had last year. I wonder if they are going IPO or trying to sell the program? Quote
TCH-Dick Posted March 10, 2006 Posted March 10, 2006 That's actually the second time. Here's the first. I think its the same one? Quote
TCH-Bruce Posted March 10, 2006 Posted March 10, 2006 I think its the same one? And Rob posted it twice! Quote
TCH-Rob Posted March 10, 2006 Author Posted March 10, 2006 Trying to up my post count. BTW, Thomas posted the first one. I must have missed it. Quote
TCH-Rob Posted March 10, 2006 Author Posted March 10, 2006 No silly Thomas. I meant, when I was looking at me emails about security notices and comparing them with what we had posted in this part of the forums, I did not notice that it had already been covered. I am aware of the fact that I did post in the other thread now that it has been brought to my attention. You better stop picking on me, I am mailing you something this weekend and if you are not careful I just might keep it for myself. Quote
TCH-Thomas Posted March 10, 2006 Posted March 10, 2006 lol. It´s just that I read as if you thought you had not seen it. I will my friend. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.