lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <649CDCB56C88AA458EFF2CBF494B620401D65FB9@USILMS12.ca.com> Date: Mon, 11 Dec 2006 16:29:39 -0500 From: "Williams, James K" <James.Williams@...com> To: <full-disclosure@...ts.grok.org.uk> Subject: Re: LS-20061001 - Computer Associates BrightStor ARCserve Backup v11.5 Remote Buffer Overflow Vulnerability > [Full-disclosure] LS-20061001 - Computer Associates BrightStor > ARCserve Backup v11.5 Remote Buffer Overflow Vulnerability > advisories at lssec.com advisories at lssec.com > Fri Dec 8 21:40:47 GMT 2006 > > LS-20061001 > [...] > > Technical details: > > http://www.lssec.com/advisories.html > > LSsecurity - LSsec.com CA is aware of this report. We urge customers running BrightStor ARCserve Backup r11.5 to install SP2. Regards, Ken Ken Williams ; 0xE2941985 Director, CA Vulnerability Research _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists