> It is exactly the same day when Sunbelt reported that they were
informed Microsoft security people:

We were the first to see it in the wild, but unbeknownst to the security
community, Microsoft had reportedly been working with ISS on this issue
(ISS disclosed it on the 19th --
http://xforce.iss.net/xforce/alerts/id/237).   

One can then assume that Microsoft was already in the process of fixing
it, and while they were doing that, we started finding it exploiting
systems. 

Alex



-----Original Message-----
From: Juha-Matti Laurio [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, September 26, 2006 3:45 PM
To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk
Subject: Windows VML security update MS06-055 released

Security update for Windows Vector Markup Language (VML) vulnerability
has been released.

Fix is available via Microsoft Update or downloadable with links
included to MS06-055:
http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx

Fix information has been added to Windows VML Vulnerability FAQ
(CVE-2006-4868) http://blogs.securiteam.com/?p=640

and details will be added shortly.

It appears that the timestamp of updated Vgx.dll library is 18th
September, 2006.

>From the Security Update Information / File Information section of new
MS bulletin:

Windows XP Service Pack 2 (all versions) and Windows XP Professional x64
Vgx.dll - 6.0.2900.2997 - 18-Sep-2006 - 14:28 (UTC) - 851,968

It is exactly the same day when Sunbelt reported that they were informed
Microsoft security people:
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-be
ing.html

- Juha-Matti

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to