Am Freitag, den 14.10.2005, 17:53 +0200 schrieb Mauro Tortonesi:

> yesterday i was notified by iDEFENSE of a remotely exploitable buffer 
> overflow in the NTLM authentication code. this vulnerability could allow 
> a malicious website to run arbitrary code on the machine running the 
> wget client.

just some feedback from germans most important IT press:
http://www.heise.de/newsticker/meldung/64912 (sorry only german)

The last paragraph says something like:
"Notable is the fast time of reaction of the Open Source developer: two
days ago the problem was reported, yesterday corrected packages were
produced and details of the vulnerability were published."

Just want to give you very possitive feedback and say thanks.:)

-- 
Noèl Köthe <noel debian.org>

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to