lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <10F989A7B6FF4541A371E51B42EB6E3706BD6DFD@usilms24.ca.com>
Date: Thu, 12 Feb 2004 16:32:40 -0500
From: "Jensen, Greg" <Greg.Jensen@...com>
To: <bugtraq@...urityfocus.com>
Subject: FW: CA Response: eTrust InoculateIT/Antivirus 6.0 for Linux vulnerability


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A typo was quickly identified in the URL below from my original
posting yesterday.   Please use the following URL instead, if any
eTrust Antivirus or InoculateIT customers are wanting to report any
problems they feel may be related to this, or wish to monitor the
posting of any related information.  

http://customerconnect.ca.com/

Thanks!

Greg Jensen
Computer Associates
eTrust - Product Manager

- -------------------------------------------



"Computer Associates has been investigating the vulnerability claims
from the recent Bugtraq posting, related to eTrust Antivirus 6.0 for
Linux. Though it is too early to determine the accuracy of this
claim, and the platforms it may cover, Computer Associates takes this
and any claims regarding the quality of our solutions, with the
utmost importance.  Computer Associates will be investigating this
further, and if substantiated, will notify our customers of any
impact this may or may not have within their environment, and the
steps that should be taken to remediate any risk. If any eTrust
Antivirus customer believes they have been affected by this, we
recommend that they report their issues with our Customer Support
Center at (866)422-2774, or can monitor the posting of information at
http://ConnectSupport.ca.com"

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQCvw9gX+SLE4KZjEEQKv5ACfX7fChQrHAcY3XlETnfZcoKrQHfcAn3EV
HG9NhXCcYtfAlMQuacjld2ja
=BDvI
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ