lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20041214024536.GC11708@specialk> Date: Mon, 13 Dec 2004 21:45:36 -0500 From: Dan Margolis <krispykringle@...too.org> To: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com Subject: Re: [Full-Disclosure] [HV-LOW] Symantec LiveUpdate issues may cause DoS If an attacker can spoof the signature file download site, he can potentially do quite a bit worse than this (in that he can deny the usability of the antivirus engine at all by providing a bogus signature file). I'd think that some form of cryptography would be in use to prevent this (either SSL or signing of the archives themselves). Am I mistaken? (Caveat being that I don't use any anti-virus products of this nature, so I really don't know.) On Thu, Nov 04, 2004 at 03:56:02PM -0800, vuln@...view.com wrote: > After downloading ZIP archive off the website (either legitimate > Symantec website or a spoofed one controlled by attacker) -- Dan
Powered by blists - more mailing lists