Multiple vulnerabilities in bip might allow remote unauthenticated attackers to cause a Denial of Service or possibly execute arbitrary code.
|Package||net-irc/bip on all architectures|
|Affected versions||< 0.8.8-r1|
|Unaffected versions||>= 0.8.8-r1|
bip is a multi-user IRC proxy with SSL support.
Multiple vulnerabilities have been discovered in bip:
A remote attacker could exploit these vulnerabilities to execute arbitrary code with the privileges of the user running the bip daemon, or cause a Denial of Service condition.
There is no known workaround at this time.
All bip users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-irc/bip-0.8.8-r1"
NOTE: The CVE-2010-3071 flaw was already corrected in an earlier version of bip and is included in this advisory for completeness.