Full Disclosure mailing list archives
Re: Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Fri, 21 Sep 2007 17:43:16 +0400
Dear Panda Security Response, secure () pandasoftware com was contacted about this same vulnerability in Panda Antivirus 2007 on August, 11 2006 (more than year ago) without any results and response, until information was published in Bugtraq. As far, as I can see, pandasecurity.com is Swedish domain of Panda while pandasoftware.com is international one. I believe it's quite reasonable to have secure () pandasoftware com to be forwarded to secure () pandasecurity com, don't you think so? --Thursday, September 20, 2007, 12:58:42 AM, you wrote to full-disclosure () lists grok org uk: PSR> Users of vulnerable 2007 versions should upgrade to Panda Antivirus PSR> 2008 and apply the fix provided. <skipped> PSR> For future vulnerability reporting to Panda please write specifically PSR> and exclusively to "Panda Security Response" PSR> <secure () pandasecurity com> instead of generic beta or informational PSR> contact mailboxes. <skipped> PSR> blog: http://research.pandasoftware.com -- ~/ZARAZA http://securityvulns.com/ Да, ему чертовски повезло. Эх и паршиво б ему пришлось если бы он выжил! (Твен) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again) Panda Security Response (Sep 19)
- Re: Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again) 3APA3A (Sep 21)
- <Possible follow-ups>
- Re: Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again) Panda Security Response (Sep 24)