lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080708074904.31454.qmail@securityfocus.com> Date: 8 Jul 2008 07:49:04 -0000 From: galia@...i.com To: bugtraq@...urityfocus.com Subject: Re: Local vulnerability in WeFi Client v3.2.1.4.1(Update) Thank you for bringing this to our attention. The security issue only occurs when the WeFi diagnostic mode is manually selected by the user. This is not the normal operation mode and is only used for debugging purposes. In any case, the mentioned info was mistakenly added to the collected logs. Please be assured that the software has been modified not to further collect such debugging data. A fixed version is already available on our site.