[21142] in bugtraq
Re: [SNS Advisory No.32] w3m malformed MIME header Buffer Overflow Vulnerability
daemon@ATHENA.MIT.EDU (Robert van der Meulen)
Fri Jun 22 14:37:39 2001
Date: Fri, 22 Jun 2001 04:47:07 +0200
From: Robert van der Meulen <rvdm@cistron.nl>
To: bugtraq@securityfocus.com
Message-ID: <20010622044707.A15598@wiretrip.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="r5Pyd7+fXNt84Ff3"
Content-Disposition: inline
In-Reply-To: <20010621121308.C1288@zax.half.pint-stowp.cx>
--r5Pyd7+fXNt84Ff3
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi,
Quoting Jim Knoble (jmknoble@jmknoble.cx):
> Some information in English is available here:
> http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/536.html
> Can anyone confirm that the patch there is appropriate?
The patch there is appropriate.
Greets,
Robert
--=20
Linux Generation
encrypted mail preferred. finger rvdm@debian.org for my GnuPG/PGP key.
Grues are everywhere man! They're like starbucks!
--r5Pyd7+fXNt84Ff3
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE7MrGqFLJHZigagQ4RAg0yAJ9L8CHg6bYMMtJPAVhaLJuklPQevwCguny9
LWeDHzvWDLG/Gn+bHEsJpJQ=
=fbDk
-----END PGP SIGNATURE-----
--r5Pyd7+fXNt84Ff3--