Re: [Full-disclosure] rPSA-2007-0011-1 wget
[SNIP] Description: Previous versions of the wget package can crash if they contact a malicious FTP server. No further vulnerability is enabled by this minor flaw; system security is not threatened in any way. Which might well be a good thing eh? Afterall, if the site is malicious, better the app die and dump then allow one to prceed to inflict harm upon ones self? Thanks, Ron DuFresne -- Sometimes you get the blues because your baby leaves you. Sometimes you get'em 'cause she comes back. --B.B. King ***testing, only testing, and damn good at it too!*** OK, so you're a Ph.D. Just don't touch anything.
rPSA-2007-0011-1 wget
rPath Security Advisory: 2007-0011-1 Published: 2007-01-23 Products: rPath Linux 1 Rating: Informational Exposure Level Classification: Indirect Deterministic Denial of Service Updated Versions: wget=/[EMAIL PROTECTED]:devel//1/1.10.2-4-0.1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719 https://issues.rpath.com/browse/RPL-930 Description: Previous versions of the wget package can crash if they contact a malicious FTP server. No further vulnerability is enabled by this minor flaw; system security is not threatened in any way.