[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] AVG 8.0.173 flaw
- To: <tribalmp@xxxxxxxxx>, <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] AVG 8.0.173 flaw
- From: alessandro telami <admin@xxxxxxxxxxxxxxxxx>
- Date: Wed, 5 Nov 2008 15:49:44 +0000
What sort of vulnerability would this be???> Date: Wed, 5 Nov 2008 08:52:28
+0000> From: tribalmp@xxxxxxxxx> To: full-disclosure@xxxxxxxxxxxxxxxxx>
Subject: [Full-disclosure] AVG 8.0.173 flaw> > AVG 8.0.173 flaw> Nov 5, 2008> >
-- Affected Vendors:> AVG Technologies> > -- Affected Products:> AVG 8.0.173> >
-- Vulnerability Details:> There is a flaw in AVG 8.0 that alow a user to
shutdown the AVG> Resident Shield Service via Task Manager temporarily and
execute a> malicious file while the AVG Resident Shield Service is restarting.>
> Note: The AVG Resident Shield Service can be crashed, until next boot.> > --
Dificulty Level:> low> > -- Vendor Response:> None> > -- Disclosure Timeline:>
2008-11-05 - Disclosure> > -- About:> Fabio Pinheiro at
http://dicas3000.blogspot.com> >
_______________________________________________> Full-Disclosure - We believe
in it.> Charter: http://lists.grok.org.uk/full-disclosure-charter.html> Hosted
and sponsored by Secunia - http://secunia.com/
_________________________________________________________________
Win £1000 John Lewis shopping sprees with BigSnapSearch.com
http://clk.atdmt.com/UKM/go/117442309/direct/01/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/