lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <021220081704.20328.47B1D1900005220E00004F6822070210539D0A9B0A03020E900006@comcast.net> Date: Tue, 12 Feb 2008 17:04:16 +0000 From: jfvanmeter@...cast.net To: Luigi Auriemma <aluigi@...istici.org> Cc: packet@...ketstormsecurity.org, vuln@...unia.com, news@...uriteam.com, full-disclosure@...ts.grok.org.uk, bugs@...uritytracker.com, bugtraq@...urityfocus.com Subject: Re: Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0 Interresting, how are you running the Get command? Is safenet installed on a workstation or server? --John -------------- Original message ---------------------- From: Luigi Auriemma <aluigi@...istici.org> > jfvanmeter@...cast.net wrote: > > Hello everyone, was the server rebooted after the patch was installed? > > Naturally, in fact before the patch I was able to exploit the directory > traversal with both slash and backslash while after having applied the > fix only when I use the backslash. > > I have also uninstalled, redownloaded and reinstalled both the program > and the patch just in this moment and I can confirm the exact behaviour > described above. > > > --- > Luigi Auriemma > http://aluigi.org _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists