[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7E45577E4E72EC42BB3F8560D57E755145A3190A@manexchprd01>
Date: Thu, 15 Dec 2011 09:03:56 +0000
From: "Research@...Secure" <research@...secure.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: NGS00138 Patch Notification: Websense Triton 7.6 - Authentication
bypass in report management UI
High Risk Vulnerability in Websense Triton
15 December 2011
Ben Williams of NGS Secure has discovered a High risk vulnerability in Websense
Impact: Authentication bypass
Versions affected include:
Websense Web Security Gateway Anywhere v7.6
Websense Web Security Gateway v7.6
Websense Web Security v7.6
Websense Web Filter v7.6
Windows and Linux
v7.6 prior to Hotfix 24
This issue is addressed in Hotfix 24, which can be downloaded at:
https://www.websense.com/content/mywebsense-hotfixes.aspx
NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure.
NGS Secure Research
http://www.ngssecure.com
Powered by blists - more mailing lists