lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <10F989A7B6FF4541A371E51B42EB6E3706B8AEF9@usilms24.ca.com>
Date: Wed, 11 Feb 2004 20:43:34 -0500
From: "Jensen, Greg" <Greg.Jensen@...com>
To: <bugtraq@...urityfocus.com>
Subject: CA Response: eTrust InoculateIT/Antivirus 6.0 for Linux vulnerability


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Computer Associates has been investigating the vulnerability claims
from the recent Bugtraq posting, related to eTrust Antivirus 6.0 for
Linux. Though it is too early to determine the accuracy of this
claim, and the platforms it may cover, Computer Associates takes this
and any claims regarding the quality of our solutions, with the
utmost importance.  Computer Associates will be investigating this
further, and if substantiated, will notify our customers of any
impact this may or may not have within their environment, and the
steps that should be taken to remediate any risk. If any eTrust
Antivirus customer believes they have been affected by this, we
recommend that they report their issues with our Customer Support
Center at (866)422-2774, or can monitor the posting of information at
http://ConnectSupport.ca.com 
 
Thank you!
 

Greg Jensen
Computer Associates
Product Manager - eTrust


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQCraRQX+SLE4KZjEEQIrVgCeIvambj18+EHncjmzzPI1r6JZxtcAoPTW
NggPyqLvlXLu2LxkdO6GMBTh
=0tji
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ