-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 cURL is vulnerable to a buffer overflow which could lead to the execution of arbitrary code.
Solution: upgrade to 7.15.0. Workaround until solved: Disable NTLM authentication by not using the --anyauth or --ntlm options when using cURL (the command line version). Workarounds for programs that use the cURL library depend on the configuration options presented by those programs. http://security.gentoo.org/glsa/glsa-200510-19.xml http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185 http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities Yaakov -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (Cygwin) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDW+iRpiWmPGlmQSMRAqtgAJ9Sw+lbZiPKVppjVF25cRicJ0Ss/ACffzx/ eyeGb3+a8JrTZZY0CnLw590= =mPhz -----END PGP SIGNATURE-----
