Rob Swindell wrote to GitLab issue in main/sbbs <=-
open https://gitlab.synchro.net/main/sbbs/-/issues/269
With Windows NTFS, appending "::$DATA" to a filename is an alternate
name for accessing a file's contents (data).
With Windows NTFS, appending "::$DATA" to a filename is an alternate name for accessing a file's contents (data).
I saw a change to websrvr.c in the commit log - has there been any examples of exploits in the wild of this vulnerability, and should we be upgrading sooner rather than later or wait for the bigger picture solution you
refer to?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 410 |
Nodes: | 16 (2 / 14) |
Uptime: | 77:31:24 |
Calls: | 8,578 |
Calls today: | 2 |
Files: | 13,225 |
Messages: | 5,932,058 |