lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316191210.2E30B52AA@lists.grok.org.uk> Date: Thu Mar 16 20:33:07 2006 From: toonces.foo at gmail.com (Steven Smith) Subject: [ADVISORY] - =Thu Mar 16 14:12:06 EST 2006= - Buffer Overflow in Dantz Retrospect [ADVISORY] - =Thu Mar 16 14:12:06 EST 2006= - Buffer Overflow in Dantz Retrospect 1. Background There was no background. 2. History 0-1-2006 - Vendor Notification. 12-2-2006 - Vendor Reply. 16-3-2006 - Public Disclosure. 3. Workaround This problem has no workarounds on this problem in question. Appendix A Vendor Information http://www.dantz.com Appendix B References RFC 9263 Contact Steven Smith toonces.foo@...il.com CISSP CEH SSP-CNSA SSP-MPA GWAS CAP SSCP