Re: brief report on NTLM buffer overflow

2005-10-17 Thread Mauro Tortonesi
Daniel Stenberg wrote: On Fri, 14 Oct 2005, Noèl Köthe wrote: The last paragraph says something like: "Notable is the fast time of reaction of the Open Source developer: two days ago the problem was reported, yesterday corrected packages were produced and details of the vulnerability were pub

RE: brief report on NTLM buffer overflow

2005-10-17 Thread Herold Heiko
> From: Daniel Stenberg [mailto:[EMAIL PROTECTED] > Sent: Friday, October 14, 2005 8:20 PM > > I mailed Hrvoje the patch roughly 50 minutes after the > notification (and he > forwarded it to Mauro). Wget 1.10.2 was relased less than 14 > hours after the > first mail brought our attention to t

Re: brief report on NTLM buffer overflow

2005-10-14 Thread Daniel Stenberg
On Fri, 14 Oct 2005, Noèl Köthe wrote: The last paragraph says something like: "Notable is the fast time of reaction of the Open Source developer: two days ago the problem was reported, yesterday corrected packages were produced and details of the vulnerability were published." Just want to

Re: brief report on NTLM buffer overflow

2005-10-14 Thread Noèl Köthe
Am Freitag, den 14.10.2005, 17:53 +0200 schrieb Mauro Tortonesi: > yesterday i was notified by iDEFENSE of a remotely exploitable buffer > overflow in the NTLM authentication code. this vulnerability could allow > a malicious website to run arbitrary code on the machine running the > wget clien