lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200406101636.19128.secure@symantec.com>
Date: Thu, 10 Jun 2004 16:36:08 -0600
From: Symantec Product Security Team <secure@...antec.com>
To: bugtraq@...urityfocus.com
Subject: RE: Potential Security Flaw in Symantec Gateway Security 360R


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec is currently investigating this issue. Our testing to this
point indicates that default configurations do not appear to be
vulnerable. The Symantec Product Security Team is working with the
poster to try and identify the conditions where they are seeing this
issue occur.

Symantec is fully committed to the prompt and timely resolution of
all security vulnerabilities in our products. Potential
vulnerabilities in Symantec products should be reported to
secure@...antec.com. This email address is monitored by the Symantec
Product Security tteam. In addition, a web page has been created at
http://www.symantec.com/security/ that contains a copy of or our
response policy and the public PGP key for secure@...antec.com

- -- 
- -------------------
Symantec Product Security Team
secure@...antec.com
http://www.symantec.com/security
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAyOJgAux7PDRKDmERAiIIAJ0WQlDbxGWUJnIanpncvebH5cRHCwCghFI/
qsnKYlB/AtHepjqTIsDmgdA=
=XFn/
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ