This bug was fixed in the package stunnel4 - 3:4.53-1ubuntu0.1
--------------- stunnel4 (3:4.53-1ubuntu0.1) quantal-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via NTLM auth (LP: #1150150) - debian/patches/CVE-2013-1762.patch: properly handle length in src/protocol.c. - CVE-2013-1762 -- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 07:42:48 -0500
This bug was fixed in the package stunnel4 - 3:4.53-1ubuntu0.1
---------------
stunnel4 (3:4.53-1ubuntu0.1) quantal-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via NTLM auth (LP: #1150150) patches/ CVE-2013- 1762.patch: properly handle length in protocol. c.
- debian/
src/
- CVE-2013-1762
-- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 07:42:48 -0500