lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <D7DDF83751235046BFAC82E1244EB4C807B574DB@usilms23.ca.com>
Date: Fri, 27 May 2005 15:02:34 -0400
From: "Williams, James K" <James.Williams@...com>
To: <bugtraq@...urityfocus.com>
Subject: RE: CAID 32896 - Computer Associates Vet Antivirus engine heap overflow vulnerability



Hello,

I have an update for the "Computer Associates Vet Antivirus engine 
heap overflow vulnerability" that was disclosed on 2005/05/23.  
'BrightStor ARCserve Backup (BAB) r11.1 Windows' does NOT use the Vet 
Antivirus engine in any part of the product.  Furthermore, none of the 
BrightStor ARCserve Backup products use the Vet Antivirus engine.  BAB 
is consequently NOT affected by the heap overflow vulnerability.

References:
CAID 32896 
OSVDB 16780
CVE CAN-2005-1693
BID 13710

Regards,
kw
                                                           
Ken Williams ; Vulnerability Research 
Computer Associates ; 0xE2941985
A9F9 44A6 B421 FF7D 4000 E6A9 7925 91DF E294 1985



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ