mailing list archives
Update: [TZO-15-2009] Aladdin eSafe generic bypass - Forced release
From: Thierry Zoller <Thierry () Zoller lu>
Date: Thu, 7 May 2009 10:55:12 +0200
Aladdin responded and posted a blog post, please read the timeline and
then the blog post.
It is said that :
"This means that in case a customer receives such a specially crafted
archive file, he will not be able to extract it."
This is wrong. Winrar for example extracts the PoC files fine.
"We have acted on the issue after two days since its first coming
Please see the timeline below and draw your conclusions
"The eSafe products affected by this vulnerability are 7.1, 7.0, and
I was not communicated this information and had to find a referer in
my log files in order to know.
Full update to be published after more discussions...
IV. Disclosure timeline
04/04/2009 : Send proof of concept, description the terms under which
I cooperate and the planned disclosure date. There is
no security adress listed at  and hence took previously
known security contacts that are known to exist.
13/04/2009 : Resending. Copied security () aladdin de, security () aladdin com
secure () aladdin com, secure () aladdin de,support () aladdin com,
support () aladdin de in CC.
16/04/2009 : Resending specifying this is the last attempt to disclose
18/04/2009 : Online virus scan service offered to gap the bridge between
vendors that don't reply and myself. Aladin was contacted
through third party.
19/04/2009 : Aladdin visited the blog entry that explains the bypasses
and impacts. http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html
27/04/2009 : Release of this limited advisory.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Update: [TZO-15-2009] Aladdin eSafe generic bypass - Forced release Thierry Zoller (May 07)