lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 16 Feb 2010 18:10:18 -0500
From: security@...maly.com
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Enomaly ECP: Multiple vulnerabilities in
	VMcasting protocol & implementation.

The reported issue DOES NOT AFFECT ANY CURRENT ENOMALY PRODUCT.  Our current
products are Enomaly ECP Service Provider Edition and Enomaly ECP High
Assurance Edition, and neither utilizes the "vmfeed" module.

Specifically, the "vmfeed" module has not been utilized in any version of
our products released since the initial release of Enomaly ECP Service
Provider Edition in June 2009.  The "vmfeed" module was utilized only in our
previous-generation "Community Edition" product, which has been deprecated
and withdrawn from distribution.  Enomaly ECP Service Provider Edition is a
completely different product from the old Community Edition.

As a result, since the Community Edition product is deprecated and has been
withdrawn, Enomaly has not investigated this reported issue.

Further information on the differences between the deprecated Community
Edition technology and our current Service Provider Edition technology can
be found at http://src.enomaly.com.

The Enomaly Team

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ