lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 16 Jun 2004 12:56:31 -0500 From: Sym Security <secure@...antec.com> To: bugtraq@...urityfocus.com Subject: Re: Symantec Enterprise Firewall DNSD cache poisoning Vulnerability Symantec is aware of the posting of this issue, http://www.securityfocus.com/archive/1/366113/2004-06-13/2004-06-19/0 Symantec engineers are reviewing the posted information. If it is validated we will respond accordingly. Symantec takes the security of our products seriously and is a responsible disclosure company. You can view our response policies at http://www.symantec.com/security. We would like to work directly with anyone who believes they have found a security issue in a Symantec product to validate the problem and coordinate any response deemed necessary. Please contact secure@...antec.com concerning security issues with Symantec products. Symantec Product Security Team secure@...antec.com http://www.symantec.com/security
Powered by blists - more mailing lists