Vigil@nce - Websense Web Security, Filter: bypassing filtering via WDC/driver
September 2012 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can rename WDC.exe, or delete a driver file, in
order to bypass rules of Websense Web Security and Filter.
Impacted products: Websense Web Filter, Websense Web Security
Severity: 2/4
Creation date: 24/08/2012
DESCRIPTION OF THE VULNERABILITY
A local attacker can rename WDC.exe, or delete a driver file, in
order to bypass rules of Websense Web Security and Filter.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN