This bug was fixed in the package stunnel4 - 3:4.53-1ubuntu0.1

---------------
stunnel4 (3:4.53-1ubuntu0.1) quantal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via NTLM auth (LP: #1150150)
    - debian/patches/CVE-2013-1762.patch: properly handle length in
      src/protocol.c.
    - CVE-2013-1762
 -- Marc Deslauriers <[email protected]>   Tue, 28 Jan 2014 07:42:48 
-0500

** Changed in: stunnel4 (Ubuntu Quantal)
       Status: Confirmed => Fix Released

** Changed in: stunnel4 (Ubuntu Precise)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1150150

Title:
  Security vulnerability in stunnel versions 4.21 - 4.54

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/stunnel4/+bug/1150150/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to