-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

cURL is vulnerable to a buffer overflow which could lead to the
execution of arbitrary code.

Solution:  upgrade to 7.15.0.

Workaround until solved:
Disable NTLM authentication by not using the --anyauth or --ntlm
options when using cURL (the command line version). Workarounds for
programs that use the cURL library depend on the configuration options
presented by those programs.

http://security.gentoo.org/glsa/glsa-200510-19.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDW+iRpiWmPGlmQSMRAqtgAJ9Sw+lbZiPKVppjVF25cRicJ0Ss/ACffzx/
eyeGb3+a8JrTZZY0CnLw590=
=mPhz
-----END PGP SIGNATURE-----

Reply via email to