[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Re: Hamachi Password Disclosure Vulnerability
From: anonymous () mailinator ! com
Date: 2008-03-30 20:55:47
Message-ID: 20080330205547.8304.qmail () securityfocus ! com
[Download RAW message or body]
This is a bogus vulnerability.
Ability to dump the process memory for a random system account implies that the \
system is fully compromised.
Besides Hamachi 1.x does not use password-based login authentication as it's clearly \
stated in a product description.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic