lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C2F9B79F0720D311A4DB0008C7B10E8A02942DC9@svch04.laceynt>
Date: Fri, 6 Feb 2004 15:52:29 -0800
From: "GroupShield for Exchange (SVCH04)" <NAICityHallSVCH04@...lacey.wa.us>
To: "'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com>, 
	"'bug-libtool@....org'" <bug-libtool@....org>
Subject: ALERT -  GroupShield ticket number OA1494_1076111425_SVCH04_1 was
	generated

Action Taken:
The attachment was quarantined from the message and replaced with a text
file informing the recipient of the action taken.

To:
bugtraq@...urityfocus.com <bugtraq@...urityfocus.com>; bug-libtool@....org
<bug-libtool@....org>

From:
Mail Delivery Subsystem <MAILER-DAEMON@...ins.net>

Sent:
1188103680,29617420

Subject:
Symlink Vulnerability in GNU libtool <1.5.2

Attachment Details:-

Attachment Name: readme.pif
File: readme.pif
Infected? Yes
Repaired? No
Blocked? No
Deleted? No
Virus Name: W32/Mydoom.a@MM



	
Please note:  this email may be considered a record subject to public
review.

Content of type "application/ms-tnef" skipped

_______________________________________________
Bug-libtool mailing list
Bug-libtool@....org
http://mail.gnu.org/mailman/listinfo/bug-libtool

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ