[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7E45577E4E72EC42BB3F8560D57E755145A31927@manexchprd01>
Date: Thu, 15 Dec 2011 09:06:36 +0000
From: "Research@...Secure" <research@...secure.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: NGS00140 Patch Notification: Websense Triton 7.6 - Unauthenticated
remote command execution as SYSTEM
Critical Vulnerability in Websense Triton
15 December 2011
Ben Williams of NGS Secure has discovered a Critical vulnerability in Websense
Impact: Unauthenticated remote command execution as SYSTEM
Versions affected include:
Websense Web Security Gateway Anywhere v7.6
Websense Web Security Gateway v7.6
Websense Web Security v7.6
Websense Web Filter v7.6
Windows and Linux
v7.6 prior to Hotfix 24
This issue is addressed in Hotfix 24, which can be downloaded at:
https://www.websense.com/content/mywebsense-hotfixes.aspx
NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure.
NGS Secure Research
http://www.ngssecure.com
Powered by blists - more mailing lists