lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031005154131.24132.qmail@sf-www2-symnsj.securityfocus.com> Date: 5 Oct 2003 15:41:31 -0000 From: Chris Norton <kicktd@...mail.com> To: bugtraq@...urityfocus.com Subject: Access Runner DSL Console vulnerability update While doing some more testing I have found that some Access Runner's are actually "immune" to this type of attack. I do not know just yet why some are immune and some are not. Still trying to get in contact with Conexant on this but have yet to find any contact info. Please do take note that this does not change the original status as they are still able to be exploited. If anyone else could please confirm this I would appreciate it.