Re: [Full-disclosure] rPSA-2007-0011-1 wget

2007-01-25 Thread Ron DuFresne


[SNIP]


 Description:
 Previous versions of the wget package can crash if they contact a
 malicious FTP server.  No further vulnerability is enabled by this
 minor flaw; system security is not threatened in any way.



Which might well be a good thing eh?  Afterall, if the site is malicious,
better the app die and dump then allow one to prceed to inflict harm upon
ones self?


Thanks,


Ron DuFresne
-- 
Sometimes you get the blues because your baby leaves you. Sometimes you get'em
'cause she comes back. --B.B. King
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.




rPSA-2007-0011-1 wget

2007-01-23 Thread rPath Update Announcements
rPath Security Advisory: 2007-0011-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Informational
Exposure Level Classification:
Indirect Deterministic Denial of Service
Updated Versions:
wget=/[EMAIL PROTECTED]:devel//1/1.10.2-4-0.1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719
https://issues.rpath.com/browse/RPL-930

Description:
Previous versions of the wget package can crash if they contact a
malicious FTP server.  No further vulnerability is enabled by this
minor flaw; system security is not threatened in any way.