[Secure-testing-team] Re: iDEFENSE Security Advisory
[IDEF1202] Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability
Noèl Köthe
noel at debian.org
Thu Oct 13 10:51:38 UTC 2005
Am Donnerstag, den 13.10.2005, 12:39 +0200 schrieb Florian Weimer:
> * Noèl Köthe quotes iDEFENSE:
>
> >> this issue, it will be publicly released in 60 days on 12/12/2005.
>
> Unfortunately, <secure-testing-team at lists.alioth.debian.org> is a
> public mailing list, so it's no longer possible to hide this issue.
Its already public from the wget mailinglist from where I've got this
info:
http://www.mail-archive.com/wget%40sunsite.dk/msg08294.html
or
http://article.gmane.org/gmane.comp.web.wget.general/5064
A fixed 1.10.2 was released already:
http://www.mail-archive.com/wget%40sunsite.dk/msg08295.html
--
Noèl Köthe <noel debian.org>
Debian GNU/Linux, www.debian.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20051013/2c8d8416/attachment.pgp
More information about the Secure-testing-team
mailing list