Citadel/UX contains a flaw that may allow a remote denial of service. The issue is triggered when a user connects to port 504 on the server and sends a 'USER' command containing more than 97 bytes causing a buffer overflow. This will cause the server to crash resulting in loss of availability for the server.
Remote / Network Access
Denial of Service,
Loss of Integrity,
Loss of Availability
Currently, there are no known workarounds or upgrades to correct this issue. However, Citadel/UX has released a patch to address this vulnerability.
The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO
warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright
holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.