lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: btoovey at igxglobal.com (Brian Toovey)
Subject: lha vuln from last week

List,

Anyone been following that lha vuln from last week?  I heard lha is in over 17 products (antivirus, archivers) but I dont see but one antivirus company come out and acknowledge it (only because a public test was run).

I consider the vuln severe - but there has been little if no buzz about it.  If mail server's running lha code can be compromised....  If desktop users only have to download their email.....

anyone have a thought on the severity of this?

http://www.securityfocus.com/bid/10243



Brian Toovey
igxglobal
389 Main Street Suite 206
Hackensack, NJ 07601
Ph: 201-498-0555x2225
btoovey@...global.com

Subscribe to the igxglobal Daily Security Briefing
http://www.igxglobal.com/dsb/register.html

igxglobal announces Daily Security Briefing newsletter
http://www.prweb.com/releases/2004/5/prweb123759.htm


The electronic message that you have received and any attachments are solely intended for the use of the addressee(s) and may contain information that is confidential. If you receive this email in error, please advise us by responding to NOC@...global.com. You are required to delete the contents and destroy any copies immediately.
igxglobal is not liable for the views expressed in this electronic message or for the consequences of any computer viruses that may be unknowingly transmitted within this message. This electronic message is also subject to standard copyright/ownership laws. It is not intended to be reproduced, or re-transmitted without the consent of the originator.









Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ