lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <201102281410@psirt.cisco.com>
Date: Mon, 28 Feb 2011 14:10:00 +0800 
From: psirt@...co.com
To: full-disclosure@...ts.grok.org.uk
Subject: Re: ZDI-11-092: (0day) Cisco Secure Desktop
	CSDWebInstaller ActiveX Control Cleaner.cab Remote Code
	Execution Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the Cisco PSIRT response to an issue that was discovered and 
reported to Cisco by ZDI regarding a vulnerability in Cisco Secure 
Desktop.

The original report is available at the following link: 
http://www.zerodayinitiative.com/advisories/ZDI-11-092

We greatly appreciate the opportunity to work with researchers on 
security vulnerabilities and welcome the opportunity to review and
assist in product reports.

This vulnerability is documented in Cisco bug ID CSCtj03005.

Cisco has published Intellishield alert ID :22528, which is available
at the following link:
http://tools.cisco.com/security/center/viewAlert.x?alertId=22528

Regards

Paul Oxman
PSIRT Incident Manager

poxman@...co.com
Phone: +65 6317 7418
Pager: poxman@...ge.cisco.com
Cisco Systems, Inc. Singapore
Cisco.com - http://www.cisco.com/global/SG/ 
PGP Key: 0x6EA839A6
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)

iFcDBQFNazsTQXnnBKKRMNARCEW1AP4xsSRy1Z0DGNzzPvmsqUXUWegY6ys4Sv2q
U4ed7Vmb4wD+JZt15Y0J4tzHnIBPaTI6rCMkqO3cGWrDPXWtcR0FHMg=
=HiD6
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ