[<prev] [next>] [day] [month] [year] [list]
Message-ID: <sfc761ee.024@mail.Stonebridgebank.com>
Date: Fri, 28 Nov 2003 14:55:39 -0500
From: "Chris Mann" <christopher@...nebridgebank.com>
To: <research@...traq.org>, <submissions@...ketstormsecurity.org>,
<bugtraq@...urityfocus.com>, <vuln-dev@...urityfocus.com>,
<vulndiscuss@...nwatch.org>, <vulnwatch@...nwatch.org>
Subject: Re: Multiple Remote Issues in Applied Watch IDS Suite
(advisory attached)
Could you please provide which versions of Command Center these exploits
were found?
Kindest,
Christopher Mann, SAGE
Systems Administrator
Stonebridge Bank
610.235.1515
cmann@...nebridgebank.com
http://www.stonebridgebank.com
>>> Bugtraq Security Systems <research@...traq.org> 11/28/2003 2:10:24
PM >>>
Hello Lists,
We have recently concluded a comprehensive audit of the Applied Watch
Command Center, which resulted with the discovering of hundreds of
vulnerabilities.
This is the first of many future advisories on the IDS suite, which
discusses two remote issues in the authentication mechanisms used.
Working proof-of-concept code is included.
There is currently no patch available from the vendor, so consider the
Threatcon[1] to be higher than normal.
Please see the attached advisory for more information.
Team Bugtraq Security
Research Division of Bugtraq Security Systems, Incorporated.
http://www.bugtraq.org
[1] The Global Internet ThreatCon,
http://www.bugtraq.org/threatcon.html
"Bugtraq.org - Keeping Track of Bugs (tm)"
Powered by blists - more mailing lists