lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 25 Jan 2012 10:05:49 +0000 From: "Research@...Secure" <research@...secure.com> To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com> Subject: NGS00118 Patch Notification: Symantec PCAnywhere Remote Code Execution as SYSTEM Critical Vulnerability in Symantec PCAnywhere 25 January 2012 Edward Torkington of NGS Secure has discovered a critical vulnerability in Symantec PCAnywhere Impact: Remote Code Execution (pre-auth) as SYSTEM Versions affected: Symantec pcAnywhere 12.5.x IT Management Suite 7.0 pcAnywhere Solution 12.5.x IT Management Suite 7.1 pcAnywhere Solution 12.6.x An updated version of the software has been released to address these vulnerabilities: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120124_00 NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure. NGS Secure Research http://www.ngssecure.com