[15880] in bugtraq

home help back first fref pref prev next nref lref last post

Re: @stake iKey 1000 Security Advisory

daemon@ATHENA.MIT.EDU (Darren Reed)
Fri Jul 21 14:26:23 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200007202339.JAA11611@cairo.anu.edu.au>
Date:         Fri, 21 Jul 2000 09:39:26 +1000
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         kingpin@ATSTAKE.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <C5119AD12E92D311928E009027DE4CCA28E5A0@atstake.com> from
              "Kingpin" at Jul 20, 2000 11:17:58 AM

In some mail from Kingpin, sie said:
>         Advisory Name: iKey 1000 Administrator Access and Data Compromise
>          Release Date: July 20, 2000
>           Application: N/A
>              Platform: Rainbow Technologies' iKey 1000
>              Severity: An attacker can login as administrator and
>                        access all private information stored on
>                        the device with no detection by the
>                        legitimate user.

Has this been tested against iKey 2000 ?  I expect the answer to be
"Yes" (USB device, etc).

home help back first fref pref prev next nref lref last post