楼主: 皇甫暮云
收起左侧

[版主公告] 赛门铁克/诺顿“代码泄露们”讨论专贴(2012年2月8日最新官方声明44楼)

  [复制链接]
饭是来装桶的
发表于 2012-1-22 19:44:35 | 显示全部楼层
好久的帐了。。那么早就被泄露了 现在又发布一遍新闻
jiey888
发表于 2012-1-22 21:13:42 | 显示全部楼层
企业版肯定是有影响的
小杨过
发表于 2012-1-26 10:07:16 | 显示全部楼层
The encoding and encryption elements within pcAnywhere are vulnerable, making users susceptible to man-in-the-middle attacks, depending on the configuration and use of the product. If a man-in-the-middle attack should occur, the malicious user could steal session data or credentials.
A secondary risk: If a malicious user obtains the cryptographic key, they can launch unauthorized remote control sessions and thus access systems and sensitive data.
If the cryptographic key itself is using Active Directory credentials, it is also possible for attackers to perpetrate other malicious activities on the network.
In an internal pcAnywhere environment, if a network sniffer was in place on a customer’s internal network and the attacker had access to the encryption details, the pcAnywhere traffic could be intercepted and decoded. This implies that a customer either has a malicious insider who planted the network sniffer or has an unknown Botnet operating in their environment. As always, security best practices are encouraged to mitigate this risk.
Since pcAnywhere exchanges user login credentials, the risk exists that a network sniffer or Botnet could intercept this exchange of information, though it would still be difficult to actually interpret the data even if the pcAnywhere source code is released.
For environments with remote users, this credential exchange introduces an additional level of exposure to external attacks.

不安全了~~~
  1. http://nakedsecurity.sophos.com/2012/01/25/symantec-stop-pcanywhere/?utm_source=facebook&utm_medium=status+message&utm_campaign=naked+security
复制代码
dgslhua
发表于 2012-1-31 23:02:11 | 显示全部楼层
本帖最后由 dgslhua 于 2012-1-31 23:04 编辑

部分nis都出19.5了,估计是补漏了,但是不怕啦~泄露的是06年的还是企业版的~我印象中 诺顿貌似07年重新写代码了,09年貌似连核心代码都改了,要是高手的话,即使再牛的防御软件,也能入侵
a13828565410
头像被屏蔽
发表于 2012-2-7 23:26:46 | 显示全部楼层
提示: 该帖被管理员或版主屏蔽
604730161
发表于 2012-2-7 23:31:50 | 显示全部楼层
不知道是不是重要的代码,再说不是说是旧版的吗,无视之
皇甫暮云
 楼主| 发表于 2012-2-7 23:33:01 | 显示全部楼层
604730161 发表于 2012-2-7 23:31
不知道是不是重要的代码,再说不是说是旧版的吗,无视之

2006版的,古董代码,黑客也要哗众取宠一番,都懂的
dfr1986
发表于 2012-2-8 00:12:01 | 显示全部楼层
貌似是说威胁要泄露,还没吧。
ADSLgg
发表于 2012-2-8 09:21:56 | 显示全部楼层
猪头无双 发表于 2012-1-20 02:22
好吧,我来凑个热闹,我觉得这次泄漏事故有幕后黑手,而且很可能就是印度的本土安全厂商,首当其冲的怀疑对 ...

岂不是说,熊猫、趋势等也危在旦夕?
guobao13
发表于 2012-2-8 09:33:07 | 显示全部楼层
已经下载代码了
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-24 17:35 , Processed in 0.095563 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表