lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 May 2005 15:19:34 +0200 (MEST) From: jamesbug@....net To: iDEFENSE Labs <labs-no-reply@...fense.com> Cc: full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org, bugtraq@...urityfocus.com Subject: Re: iDEFENSE Security Advisory 05.24.05: Ipswitch IMail Web Calendaring Arbitrary File Read Vulnerability Hi, I think this is an old bug. Please take a look at: http://lists.virus.org/full-disclosure-0309/msg01294.html "*** SID-2003-3312 [ Ipswitch ] IMail Directory Traversal Vulnerabilities" Here you can find a description of this transversal directory bug from October 2003. But it seems that some vendors only fix things which are released by the big ones. It makes me a little bit sad, that such a trivial bug wasn't fixed for about one and a half year. And under the aspect that it seems to be an old bug, I understand this statement: "The discoverer of this vulnerability wishes to remain anonymous." With Regards -- 5 GB Mailbox, 50 FreeSMS http://www.gmx.net/de/go/promail +++ GMX - die erste Adresse für Mail, Message, More +++ -- 5 GB Mailbox, 50 FreeSMS http://www.gmx.net/de/go/promail +++ GMX - die erste Adresse für Mail, Message, More +++ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists