lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 28 Nov 2003 14:55:39 -0500 From: "Chris Mann" <christopher@...nebridgebank.com> To: <research@...traq.org>, <submissions@...ketstormsecurity.org>, <bugtraq@...urityfocus.com>, <vuln-dev@...urityfocus.com>, <vulndiscuss@...nwatch.org>, <vulnwatch@...nwatch.org> Subject: Re: Multiple Remote Issues in Applied Watch IDS Suite (advisory attached) Could you please provide which versions of Command Center these exploits were found? Kindest, Christopher Mann, SAGE Systems Administrator Stonebridge Bank 610.235.1515 cmann@...nebridgebank.com http://www.stonebridgebank.com >>> Bugtraq Security Systems <research@...traq.org> 11/28/2003 2:10:24 PM >>> Hello Lists, We have recently concluded a comprehensive audit of the Applied Watch Command Center, which resulted with the discovering of hundreds of vulnerabilities. This is the first of many future advisories on the IDS suite, which discusses two remote issues in the authentication mechanisms used. Working proof-of-concept code is included. There is currently no patch available from the vendor, so consider the Threatcon[1] to be higher than normal. Please see the attached advisory for more information. Team Bugtraq Security Research Division of Bugtraq Security Systems, Incorporated. http://www.bugtraq.org [1] The Global Internet ThreatCon, http://www.bugtraq.org/threatcon.html "Bugtraq.org - Keeping Track of Bugs (tm)"
Powered by blists - more mailing lists