lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <7E45577E4E72EC42BB3F8560D57E75511CE6A1@manexchprd01> Date: Fri, 25 Mar 2011 11:12:55 +0000 From: "Research@...Secure" <research@...secure.com> To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com> Subject: NGS00051 Patch Notification: Cisco VPN Client Privilege Escalation High Risk Vulnerability in Cisco VPN client (Windows 64 bit) 25 March 2011 Gavin Jones of NGS Secure has discovered a High risk vulnerability in the Cisco VPN client (Windows 64 bit). Impact: Privilege Escalation Cisco has released a patch that addresses the issue. The announcement of this patch can be found here: http://www.cisco.com/en/US/products/products_security_advisory09186a00808a0554.shtml Updated software can be downloaded from: http://www.cisco.com/public/sw-center/sw-usingswc.shtml NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure. NGS Secure Research http://www.ngssecure.com