lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 11 Aug 2004 20:19:17 -0000 From: Pete Simpson <pete.simpson@...arswift.com> To: bugtraq@...urityfocus.com Subject: Re: Clearswift Mimesweeper Path Traversal Vulnerability In-Reply-To: <20040811154715.31487.qmail@...l2.securityfocus.com> Two important points of clarification are needed. Firstly, the vulnerability as described should refer specifically to the MIMEsweeper for Web product. It does not apply to the MAILsweeper for SMTP product. Secondly, this vulneraility was fixed at MIMEsweeper for Web v. 5.0.4 in Feb. 2004. The current version is 5.0.5. The vulnerability reported by Pierre Kroma was found on a copy of v.5.0.1 (a year old). Solution: Upgrade to 5.0.5 (17 June 2004) http://www.clearswift.com/support/msw/patch_MswWeb.aspx Pete Simpson ThreatLab Manager Clearswift The MIMEsweeper Company
Powered by blists - more mailing lists