<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2800.1106" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hello again,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>It seems that there is now a fix out for this
problem. Here are the links to the news item and the file
itself:</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2><A
href="http://www.mohadmin.com/nuke/">http://www.mohadmin.com/nuke/</A></FONT></DIV>
<DIV><FONT face=Arial size=2><A
href="http://www.mohadmin.com/nuke/download/MoHAAPatch.zip">http://www.mohadmin.com/nuke/download/MoHAAPatch.zip</A></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>The people involved in producing this patch still
haven't responded to my request for information about how this exploit works
which is disappointing. If anyone has any more information about this, I
think it would be a good idea to discuss it further. The idea of compiling
a new fgameded.so file from a Windows installation using an unofficial patch
program in order to fix an unexplained server exploit makes me a bit
uneasy. Maybe it's just me.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Shockwave</FONT></DIV></BODY></HTML>