Am Freitag, den 14.10.2005, 17:53 +0200 schrieb Mauro Tortonesi: > yesterday i was notified by iDEFENSE of a remotely exploitable buffer > overflow in the NTLM authentication code. this vulnerability could allow > a malicious website to run arbitrary code on the machine running the > wget client.
just some feedback from germans most important IT press: http://www.heise.de/newsticker/meldung/64912 (sorry only german) The last paragraph says something like: "Notable is the fast time of reaction of the Open Source developer: two days ago the problem was reported, yesterday corrected packages were produced and details of the vulnerability were published." Just want to give you very possitive feedback and say thanks.:) -- Noèl Köthe <noel debian.org>
Description: This is a digitally signed message part