http://www.vuxml.org/freebsd/f2d5e56e-67eb-11d9-a9e7-0001020eed82.html by
replacing strcat() with strncat(). Please note that I wasn't able to
reproduce the exploit described at
http://tigger.uic.edu/~jlongs2/holes/unrtf.txt on my 5.3-STABLE system.
Feedback from someone who can reproduce the exploit with an unpatched unrtf
would be appreciated
- Bump PORTREVISION
- Remove old master site that doesn't seem to have the distfile any more
VuXML: f2d5e56e-67eb-11d9-a9e7-0001020eed82
PR: ports/76852
Submitted by: Stefan Walter <sw(at)gegenunendlich.de>