lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <94ff8df050815024975fce9bc@mail.gmail.com> Date: Mon Aug 15 10:53:55 2005 From: nobnop at gmail.com (NoBrain NoPain) Subject: Privilege escalation in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3) Hello, Reed Arvin wrote: > Patches/Workarounds: > The vendor was notified of the issue. There was no response. Vendor Response: http://knowledgemap.nai.com/KanisaSupportSite/search.do?cmd=displayKC&docType=kc&externalId=KBkb42216xml&language=en_US One can find there: "McAfee was not notified in advance of this vulnerability per "standard industry practices". It would be interesting when you contacted McAfee and what you told them...;) -- nobnop