We wanted to let you know that the patch posted for
http://www.microsoft.com/Security/Bulletins/ms99-047.asp
is now applicable to Windows NT 4.0 Service Packs 4, 5 or 6.
[EMAIL PROTECTED]
I believe the instructions below provided for Outlook 98 would be similar
for Outlook 2000 clients, however I do not have immediate access to that
client for inspection at this moment in time.
Thanks,
Mark, [EMAIL PROTECTED]
http://www.ntsecurity.net
==
Adjusting
Just to keep everyone updated, Trend has examined the exploit and is
currently in the process of testing an official patch for this problem.
This should be available within a few hours at most.
Thank you,
Bob Li
Product Manager
Trend Micro, Inc.
E-Mail: [EMAIL PROTECTED]
Phone: 408-863-6341
--
Hi :)
This is just another unix port of dark spyrits excellent exploits :) keep
on the good work ! :-)
ciao,
scut / team teso
[http://teso.scene.at/]
--
- [EMAIL PROTECTED] - http://nb.in-berlin.de/scut/ - sacbuctd@ircnet --
-- you don't need a lot of people to be great, you need a few great
There is a problem (actually several) with the "cgiwrap" program on
Cobalt RaQ2 servers. It is supposed to run CGI programs as the proper
user instead of "nobody" to make CGIs a little more secure.
The Cobalt directory structure is as follows:
/home/sites/site1/ - top level directory of the sit
Hi,
This is another way to use the ?PageServices problem on Netscape Servers...
?PageServices may list directories from root (ie
www.server.com/?PageServices) to specific directories, inside the server (ie
www.server.com/html/?PageServices). This might happen (directory content
listing) even if
- Original Message -
From: Tim Jones <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, November 07, 1999 3:01 AM
Subject: Netscape Web Publisher
>This is not a HOLE. By default(I think)netscape -Enterprise/3.5.1I
installs ALOT of shit that you will never need or use. But like
At 11:54 AM 11/8/99 -0800, Elias Levy wrote:
>Juan Carlos Garcia Cuartango has found the following security vulnerability
>in Microsoft Outlook. This is a highly dangerous issue. It allow a remote
>attacker to email an Outlook user an executable which will be run when
>the user views the attachmen
Juan Carlos Garcia Cuartango has found the following security vulnerability
in Microsoft Outlook. This is a highly dangerous issue. It allow a remote
attacker to email an Outlook user an executable which will be run when
the user views the attachment without asking them whether to save it or
execu