[Secure-testing-team] Re: iDEFENSE Security Advisory [IDEF1202] Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability

Noèl Köthe noel at debian.org
Thu Oct 13 10:51:38 UTC 2005


Am Donnerstag, den 13.10.2005, 12:39 +0200 schrieb Florian Weimer:
> * Noèl Köthe quotes iDEFENSE:
> 
> >> this issue, it will be publicly released in 60 days on 12/12/2005.
> 
> Unfortunately, <secure-testing-team at lists.alioth.debian.org> is a
> public mailing list, so it's no longer possible to hide this issue.

Its already public from the wget mailinglist from where I've got this
info:

http://www.mail-archive.com/wget%40sunsite.dk/msg08294.html
or
http://article.gmane.org/gmane.comp.web.wget.general/5064

A fixed 1.10.2 was released already:

http://www.mail-archive.com/wget%40sunsite.dk/msg08295.html

-- 
Noèl Köthe <noel debian.org>
Debian GNU/Linux, www.debian.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20051013/2c8d8416/attachment.pgp


More information about the Secure-testing-team mailing list