Bug 174477 - CAN-2005-3185 WGet/Curl NTLM Username Buffer Overflow
CAN-2005-3185 WGet/Curl NTLM Username Buffer Overflow
Product: Fedora Legacy
Classification: Retired
Component: wget (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Fedora Legacy Bugs
Depends On:
  Show dependency treegraph
Reported: 2005-11-29 09:05 EST by John Dalbec
Modified: 2008-05-01 11:38 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-08-30 15:57:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description John Dalbec 2005-11-29 09:05:29 EST
+++ This bug was initially created as a clone of Bug #174476 +++

From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5)
Gecko/20051012 Netscape/8.0.4

Description of problem:
05.42.13 CVE: CAN-2005-3185
Platform: Unix
Title: Multiple Vendor WGet/Curl NTLM Username Buffer Overflow
Description: GNU wget is a software package for retrieving files using
HTTP, HTTPS and FTP. CURL is a command line tool for transferring
files with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, GOPHER,
TELNET, DICT, FILE and LDAP. They are reported to be vulnerable to a
buffer overflow issue due to improper boundary checking on user
supplied data.
Ref: http://www.securityfocus.com/bid/15102 

Version-Release number of selected component (if applicable):

How reproducible:
Didn't try

Additional info:
Comment 1 Jesse Keating 2007-08-30 15:57:13 EDT
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.

Note You need to log in before you can comment on or make changes to this bug.