+++ This bug was initially created as a clone of Bug #174476 +++ From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20051012 Netscape/8.0.4 Description of problem: 05.42.13 CVE: CAN-2005-3185 Platform: Unix Title: Multiple Vendor WGet/Curl NTLM Username Buffer Overflow Vulnerability Description: GNU wget is a software package for retrieving files using HTTP, HTTPS and FTP. CURL is a command line tool for transferring files with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE and LDAP. They are reported to be vulnerable to a buffer overflow issue due to improper boundary checking on user supplied data. Ref: http://www.securityfocus.com/bid/15102 Version-Release number of selected component (if applicable): How reproducible: Didn't try Additional info:
Fedora Legacy project has ended. These will not be fixed by Fedora Legacy.