[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
- To: "Panda Security Response" <secure@xxxxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
- From: 3APA3A <3APA3A@xxxxxxxxxxxxxxxx>
- Date: Fri, 21 Sep 2007 17:43:16 +0400
Dear Panda Security Response,
secure@xxxxxxxxxxxxxxxxx was contacted about this same vulnerability in
Panda Antivirus 2007 on August, 11 2006 (more than year ago) without
any results and response, until information was published in Bugtraq.
As far, as I can see, pandasecurity.com is Swedish domain of Panda
while pandasoftware.com is international one. I believe it's quite
reasonable to have secure@xxxxxxxxxxxxxxxxx to be forwarded to
secure@xxxxxxxxxxxxxxxxx, don't you think so?
--Thursday, September 20, 2007, 12:58:42 AM, you wrote to
full-disclosure@xxxxxxxxxxxxxxxxx:
PSR> Users of vulnerable 2007 versions should upgrade to Panda Antivirus
PSR> 2008 and apply the fix provided.
<skipped>
PSR> For future vulnerability reporting to Panda please write specifically
PSR> and exclusively to "Panda Security Response"
PSR> <secure@xxxxxxxxxxxxxxxxx> instead of generic beta or informational
PSR> contact mailboxes.
<skipped>
PSR> blog: http://research.pandasoftware.com
--
~/ZARAZA http://securityvulns.com/
Да, ему чертовски повезло. Эх и паршиво б ему пришлось если бы он выжил! (Твен)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/