From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Tolpin Message-Id: <200402270015.i1R0FJqK099733@adat.davidashen.net> To: 9fans@cse.psu.edu Subject: Re: SMTP+SPF (was: [9fans] Re: new release?) In-Reply-To: <731e1695032a803f1469c6dc8af3cdec@vitanuova.com> Content-Type: text/plain; charset=KOI8-R Date: Fri, 27 Feb 2004 04:15:19 +0400 Topicbox-Message-UUID: fbe07d80-eacc-11e9-9e20-41e7f4b1d025 > by coincidence, tonight on another list's security alert: > > >>When fetching a remote resource via FTP or HTTP, libxml2 uses special > >>parsing routines. These routines can overflow a buffer if passed a very > >>long URL. If an attacker is able to find an application using libxml2 that Do you attribute it to the number of digits in the version number?