[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Re: Hamachi Password Disclosure Vulnerability
From:       anonymous () mailinator ! com
Date:       2008-03-30 20:55:47
Message-ID: 20080330205547.8304.qmail () securityfocus ! com
[Download RAW message or body]

This is a bogus vulnerability. 

Ability to dump the process memory for a random system account implies that the \
system is fully compromised.

Besides Hamachi 1.x does not use password-based login authentication as it's clearly \
stated in a product description.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic