[23896] in bugtraq
Re: BOOZT! Standard CGI Vuln : fixed in 0.9.9
daemon@ATHENA.MIT.EDU (_kiss_@guay.com)
Thu Jan 17 14:55:46 2002
Message-ID: <5021478.1011294714320.JavaMail.nobody@aldebaran.guay.com>
Date: Thu, 17 Jan 2002 20:11:54 +0100 (CET)
From: _kiss_@guay.com
To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_Part_2055_6046565.1011294714305"
------=_Part_2055_6046565.1011294714305
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
this new version of BOOZT! Standard fixes the reported buffer overflow
vulnerability:
http://www.boozt.com/news.php
Rafael San Miguel Carrasco
rsanmcar@alum.uax.es
------=_Part_2055_6046565.1011294714305--