lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <201504011203.6.dcnm@psirt.cisco.com>
Date: Wed,  1 Apr 2015 12:03:45 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco Prime Data Center Network Manager File Information Disclosure Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Prime Data Center Network Manager File Information Disclosure Vulnerability

Advisory ID: cisco-sa-20150401-dcnm

Revision 1.0

For Public Release 2015 April 1 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

Cisco Prime Data Center Network Manager (DCNM) contains a file
information disclosure vulnerability that could allow an
unauthenticated, remote attacker to retrieve arbitrary files from the
underlying operating system.

Cisco has released free software updates that address this
vulnerability.

Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-dcnm

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=NAIi
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ