[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)



Dear Panda Security Response,


 secure@xxxxxxxxxxxxxxxxx was contacted about this same vulnerability in
 Panda  Antivirus  2007  on August, 11 2006 (more than year ago) without
 any results and response, until information was published in Bugtraq.

 As  far,  as  I  can  see, pandasecurity.com is Swedish domain of Panda
 while  pandasoftware.com  is  international  one.  I believe it's quite
 reasonable   to   have  secure@xxxxxxxxxxxxxxxxx  to  be  forwarded  to
 secure@xxxxxxxxxxxxxxxxx, don't you think so?


--Thursday, September 20, 2007, 12:58:42 AM, you wrote to 
full-disclosure@xxxxxxxxxxxxxxxxx:

 

PSR> Users of vulnerable 2007 versions should upgrade to Panda Antivirus
PSR> 2008 and apply the fix provided.

<skipped>

PSR> For future vulnerability reporting to Panda please write specifically
PSR> and exclusively to "Panda Security Response"
PSR> <secure@xxxxxxxxxxxxxxxxx> instead of generic beta or informational
PSR> contact mailboxes.

<skipped>

PSR> blog:  http://research.pandasoftware.com

-- 
~/ZARAZA http://securityvulns.com/
Да, ему чертовски повезло. Эх и паршиво б ему пришлось если бы он выжил! (Твен)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/