[23896] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BOOZT! Standard CGI Vuln : fixed in 0.9.9

daemon@ATHENA.MIT.EDU (_kiss_@guay.com)
Thu Jan 17 14:55:46 2002

Message-ID: <5021478.1011294714320.JavaMail.nobody@aldebaran.guay.com>
Date: Thu, 17 Jan 2002 20:11:54 +0100 (CET)
From: _kiss_@guay.com
To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/mixed; 
	boundary="----=_Part_2055_6046565.1011294714305"

------=_Part_2055_6046565.1011294714305
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

this new version of BOOZT! Standard fixes the reported buffer overflow 
vulnerability:


           http://www.boozt.com/news.php


         Rafael San Miguel Carrasco
         rsanmcar@alum.uax.es


------=_Part_2055_6046565.1011294714305--


home help back first fref pref prev next nref lref last post