[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Squid Proxy NTLM Authentication Buffer Overflow Vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://www.securityfocus.com/bid/10500

Why, in Debian 3.0, the updates for this vulnerability, they did not
to leave?


Eduardo Costa


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA4+zsaDPGxGE3A/gRArqjAJ9S+puXEMERtttNwxV5K/GTDR7prgCeNF7a
49pbH/VH9q7Wagv/kStVA10=
=u+Jw
-----END PGP SIGNATURE-----



Reply to: