lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 28 Feb 2011 14:20:00 +0800 From: psirt@...co.com To: full-disclosure@...ts.grok.org.uk Subject: Re: ZDI-11-091: (0day) Cisco Secure Desktop CSDWebInstaller Remote Code Execution Vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 This is the Cisco PSIRT response to an issue that was discovered and reported to Cisco by ZDI regarding a vulnerability in Cisco Secure Desktop. The original report is available at the following link: http://www.zerodayinitiative.com/advisories/ZDI-11-091 We greatly appreciate the opportunity to work with researchers on security vulnerabilities and welcome the opportunity to review and assist in product reports. This vulnerability is documented in Cisco bug ID CSCti97720. Cisco has published Intellishield alert ID 22529, which is available at the following link: http://tools.cisco.com/security/center/viewAlert.x?alertId=22529 Regards Paul Oxman PSIRT Incident Manager poxman@...co.com Phone: +65 6317 7418 Pager: poxman@...ge.cisco.com Cisco Systems, Inc. Singapore Cisco.com - http://www.cisco.com/global/SG/ PGP Key: 0x6EA839A6 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (SunOS) iFcDBQFNazz/QXnnBKKRMNARCOOTAP4nB/FF0rdDHRJoim/0np9x8X42Mz7/FCyN J6BKiLw0HwD+Ohbh6qBXM1PjO3b1IRUWXm8FGZ3H+4pCPPqLj383hQg= =kzKR -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists