lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0347095E5A1C364AA4524648C7DD6DE9014DBD55@CC-EXCHANGE-VS.campbell.com>
From: cary at campbell.com (Cary Barker)
Subject: iDEFENSE Security Advisory 07.12.04: Adobe Reader 6.0 Filename Handler Buffer Overflow Vulnerability

<snip>
02/02/2003   Exploit discovered by iDEFENSE
03/11/2004   Initial vendor notification
<snip>

Is that initial notification date a typo or did they sit on it for over
a year before notifying the vendor?

Cary Barker
Network Security Administrator
Campbell & Company, Inc.

-----Original Message-----
From: idlabs-advisories@...fense.com
[mailto:idlabs-advisories@...fense.com] 
Sent: Monday, July 12, 2004 10:50 AM
To: idlabs-advisories@...fense.com
Subject: [Full-Disclosure] iDEFENSE Security Advisory 07.12.04: Adobe
Reader 6.0 Filename Handler Buffer Overflow Vulnerability

<snip>



______________________________________________________________________
Campbell & Company, Inc.:  The information in this e-mail may contain privileged/confidential information.  If you are not the intended recipient, you must not read, use, copy or disseminate the information or take any action in reliance thereupon.  If you have received this e-mail in error, please notify Campbell & Company, Inc. immediately by e-mail or telephone and delete the e-mail and any attachments from any computer.  The information in this e-mail does not constitute an offer to sell or the solicitation of an offer to buy any securities in any jurisdiction or for the benefit of any person.  
______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ