lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <alpine.LNX.2.00.1307051426010.29884@forced.attrition.org> Date: Fri, 5 Jul 2013 14:27:26 -0500 (CDT) From: security curmudgeon <jericho@...rition.org> To: Vulnerability Lab <research@...nerability-lab.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: AVAST Internet Security Suite - Persistent Vulnerabilities Seriously? Your avast! issues weren't tested properly it seems. The command shell you invoke is running with the same privileges as the user installing/running the software. There is no privilege escalation based on the 'exploit' you report. These are not vulnerabilities. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/