Hi,
* Simon Iremonger <deb...@iremonger.me.uk> [2009-05-11 13:52]:
[...] 
> As far as I can tell, The Debian pagkages for xtightvncviewer
>   (also included unchanged in ubuntu) are still vulnerable to
>   known problem fixed upstream.
> 
> Advisory here:-
>   http://secunia.com/advisories/33807/
> 
> Fixed upstream as per:-
>   http://vnc-tight.sourceforge.net/release-1.3.10.html
> 
> Please correct me if I've missed anything!
> With thanks,

How did you verify this? From what I know this issue only 
affects the windows version.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgph3Pxyo95UL.pgp
Description: PGP signature

Reply via email to