On Thu, Jul 01, 2004 at 11:52:30AM +0100, Eduardo Costa wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> http://www.securityfocus.com/bid/10500
> 
> Why, in Debian 3.0, the updates for this vulnerability, they did not
> to leave?

Woody is apparently not affected. See for example
 http://www.nl.debian.org/security/nonvulns-woody

 | CAN-2004-0541: squid: Buffer overflow in the ntlm_check_auth (NTLM
 | authentication) function (NTLM auth is not compiled in in woody)


Cheers,
Max

-- 
308E81E7B97963BCA0E6ED889D5BD511B7CDA2DC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to