lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <00a801c24950$004b6e70$08001e0a@jin>
From: yup at tlen.pl (SEC-LABS TEAM)
Subject: Win32 Device Drivers Communication Vulnerabilities + PoC for Symantec Norton AntiVirus '2002 (probably all versions)  Device Driver

Hi,
Yes You have right, we've got a lot of response after the publication, and
we know that title should be different
(if You read the paper there is an section "The Topic Problem" bla bla), yes
like You said m$ is not guilty for that, only
software (many many device drivers are vulnerable to this type of attacks) -
but that's another story.

I hope i have answer for your questions,
Regards,
Lord YuP /Sec-Labs  ^ TKT

- - - - - - - - - - - - - -
http://sec-labs.hack.pl



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ