Greek Research & Technology Network

GRNET-CERT
Product Vulnerability Reporting Form

If you know of a vulnerability in a product, please complete this form and return it to grnet-cert@grnet.gr. Thanks, we appreciate your taking the time to report this vulnerability.

CONTACT INFORMATION =============================================================================== Let us know who you are:
    Name :
    E-mail :
    Phone / fax :
    Affiliation and address:
    Have you reported this to the vendor? [yes/no]
        If so, please let us know whom you've contacted:
            Date of your report :
            Vendor contact name :
            Vendor contact phone :
            Vendor contact e-mail :
            Vendor reference number :
        If not, we encourage you to do so--vendors need to hear about vulnerabilities from you as a customer.

POLICY INFO =============================================================================== We encourage communication between vendors and their customers. When we forward a report to the vendor, we include the reporter's name and contact information unless you let us know otherwise.
If you want this report to remain anonymous, please check here: ___ Do not release my identity to your vendor contact.

TECHNICAL INFO ===============================================================================
Please describe the vulnerability:

What is the impact of this vulnerability?
    (For example: local user can gain root/privileged access, intruders can create root-owned files,
     denial of service attack, etc.)
    a) What is the specific impact:
    b) How would you envision it being used in an attack scenario:

To your knowledge is the vulnerability currently being exploited?  [yes/no]

If there is an exploitation script available, please include it here.

Do you know what systems and/or configurations are vulnerable?  [yes/no]
    (If yes, please list them below)
    System :
    OS version :
    Verified/Guessed:

Are you aware of any workarounds and/or fixes for this vulnerability? [yes/no]
    (If you have a workaround or are aware of patches please include the information here.)

OTHER INFORMATION ===========================================================================
Is there anything else you would like to tell us?



grnet-cert@grnet.gr