Full Disclosure mailing list archives

Re: Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)


From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Fri, 21 Sep 2007 17:43:16 +0400

Dear Panda Security Response,


 secure () pandasoftware com was contacted about this same vulnerability in
 Panda  Antivirus  2007  on August, 11 2006 (more than year ago) without
 any results and response, until information was published in Bugtraq.

 As  far,  as  I  can  see, pandasecurity.com is Swedish domain of Panda
 while  pandasoftware.com  is  international  one.  I believe it's quite
 reasonable   to   have  secure () pandasoftware com  to  be  forwarded  to
 secure () pandasecurity com, don't you think so?


--Thursday, September 20, 2007, 12:58:42 AM, you wrote to full-disclosure () lists grok org uk:

 

PSR> Users of vulnerable 2007 versions should upgrade to Panda Antivirus
PSR> 2008 and apply the fix provided.

<skipped>

PSR> For future vulnerability reporting to Panda please write specifically
PSR> and exclusively to "Panda Security Response"
PSR> <secure () pandasecurity com> instead of generic beta or informational
PSR> contact mailboxes.

<skipped>

PSR> blog:  http://research.pandasoftware.com

-- 
~/ZARAZA http://securityvulns.com/
Да, ему чертовски повезло. Эх и паршиво б ему пришлось если бы он выжил! (Твен)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: