lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040604175112.23294.qmail@www.securityfocus.com>
Date: 4 Jun 2004 17:51:12 -0000
From: Ron Forrester <rjf@...pwire.com>
To: bugtraq@...urityfocus.com
Subject: Re: Format String Vulnerability in Tripwire


In-Reply-To: <20040603215236.7815.qmail@....securityfocus.com>


One more quick note -- I think I had a brain freeze and gave Paul the wrong commerical version numbers. This vulnerability exists in all currently shipping TFS releases, which means <= 4.0.1.

Sorry I didn't catch this the first time.

Ron Forrester
Security Architect
Tripwire, Inc.

>>VERSIONS AFFECTED
>>-----------------
>>Tripwire commercial versions <= 2.4
>>Tripwire open source versions <= 2.3.1
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ