[21141] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [SNS Advisory No.32] w3m malformed MIME header Buffer Overflow Vulnerability

daemon@ATHENA.MIT.EDU (Helmut Springer)
Fri Jun 22 14:22:38 2001

Date: Fri, 22 Jun 2001 12:17:44 +0200
From: Helmut Springer <delta@FaVeVe.Uni-Stuttgart.de>
To: bugtraq@securityfocus.com
Message-ID: <20010622121744.E8443@faveve.uni-stuttgart.de>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010621121308.C1288@zax.half.pint-stowp.cx>; from jmknoble@jmknoble.cx on Thu, Jun 21, 2001 at 12:13:08PM -0500

On Thu 2001-06-21 (12:13), Jim Knoble wrote:
> Some information in English is available here:
> 
>   http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/536.html
> 
> Can anyone confirm that the patch there is appropriate?

I asked Fumitoshi UKAI (Debian's w3m maintainer), he pointed me to
his correction on

http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html

which acording to him also is in w3m 0.2.1-4.deb's source package.

-- 
MfG/best regards, helmut springer           "Freedom's just another word
                                             for nothing left to lose"

home help back first fref pref prev next nref lref last post