[15880] in bugtraq
Re: @stake iKey 1000 Security Advisory
daemon@ATHENA.MIT.EDU (Darren Reed)
Fri Jul 21 14:26:23 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200007202339.JAA11611@cairo.anu.edu.au>
Date: Fri, 21 Jul 2000 09:39:26 +1000
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To: kingpin@ATSTAKE.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <C5119AD12E92D311928E009027DE4CCA28E5A0@atstake.com> from
"Kingpin" at Jul 20, 2000 11:17:58 AM
In some mail from Kingpin, sie said:
> Advisory Name: iKey 1000 Administrator Access and Data Compromise
> Release Date: July 20, 2000
> Application: N/A
> Platform: Rainbow Technologies' iKey 1000
> Severity: An attacker can login as administrator and
> access all private information stored on
> the device with no detection by the
> legitimate user.
Has this been tested against iKey 2000 ? I expect the answer to be
"Yes" (USB device, etc).