MW wrote:
> >Michael Bringle
> >Director of Engineering
> >PivX Solutions, Inc.
> >http://www.pivx.com/HomeOffice/
>
> i made a booboo and accidentaly put a ' in your url ( sorry,
> its right next to the enter key ) couldnt help but notice this tho...
>
> http://www.pivx.com/Labs/ThreatCenter.
KF :
> Famous last words?
>
> "... As it turns out, these crashes are not exploitable but
> are instead Windows performance issues ..."
Isn't that what they said about the IE Javascript flaw in March...which
then turned into code execution exploit. Umm Yep.
-Todd
__
As far as I can tell this isn’t
exploitable, can I get a second on that?
From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Drew Masters
Sent: 10 January 2006 12:20
To: Andrey Bayora
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] PoC
for the 2
Not sure if it's been previously mentioned...
It's possible to cause similiar crashes by making a malformed call to
startdoc instead of setabortproc with 64bytes of garbage data.
Cheers
DrewOn 09/01/06, Andrey Bayora <[EMAIL PROTECTED]> wrote:
Hello list,In case, someone interested:Here is the
>Michael Bringle
>Director of Engineering
>PivX Solutions, Inc.
>http://www.pivx.com/HomeOffice/
i made a booboo and accidentaly put a ' in your url ( sorry, its right next
to the enter key )
couldnt help but notice this tho...
http://www.pivx.com/Labs/ThreatCenter.asp?sortby=threat_name'
Micros
January 09, 2006 2:35 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] PoC for the 2 new WMF vulnerabilities (DoS)
Hello list,
In case, someone interested:
Here is the PoC for the 2 new WMF vulnerabilities discovered by
cocoruder
(http://ruder.cdut.net) and does not covered b
- Original Message -
From: "Danny" <[EMAIL PROTECTED]>
To:
Sent: Tuesday, January 10, 2006 2:40 AM
Subject: Re: [Full-disclosure] PoC for the 2 new WMF vulnerabilities (DoS)
On 1/9/06, Andrey Bayora <[EMAIL PROTECTED]> wrote:
> Hello list,
>
> In case,
I read that and couldn't stop laughing. More from the "I don't need
to get it to explain it" doctrine. It gets a gold star for effort, I
wonder if he pulled out a thesaurus.
-sb
On 1/9/06, Danny <[EMAIL PROTECTED]> wrote:
>
> Is this what you are referring to:
>
> http://blogs.technet.com/msrc
When did applications crashing become just a performance issue? :-)
Shirkdog
http://www.shirkdog.us
From: "KF (lists)" <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] PoC for the 2 new WMF vulnerabilities (DoS)
Date: Mon, 09 Jan 200
Famous last words?
"... As it turns out, these crashes are not exploitable but are instead
Windows performance issues ..."
-KF
Is this what you are referring to:
http://blogs.technet.com/msrc/archive/2006/01/09/417198.aspx
___
Full-Disclosur
On 1/9/06, Andrey Bayora <[EMAIL PROTECTED]> wrote:
> Hello list,
>
> In case, someone interested:
>
> Here is the PoC for the 2 new WMF vulnerabilities discovered by cocoruder
> (http://ruder.cdut.net) and does not covered by MS06-001.
>
> You can download WMF images at:
> http://www.securityelf.o
Hello list,
In case, someone interested:
Here is the PoC for the 2 new WMF vulnerabilities discovered by cocoruder
(http://ruder.cdut.net) and does not covered by MS06-001.
You can download WMF images at:
http://www.securityelf.org/files/WMF-DoS.rar
Regards,
Andrey.
_
12 matches
Mail list logo