Re: [SECURITY] Flash buffer overflow

2001-01-10 Thread Ben Bucksch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ben Bucksch wrote: > A serious security problem in Macromedia's Shockwave Flash plugin for > all platforms and browsers has been published on BugTraq. Exploited, > it allows an attacker to run arbitary code on your machine. After the problem ha

Re: [SECURITY] Flash buffer overflow

2001-01-05 Thread Ben Bucksch
Heiko Becker wrote: > what is, when I use the Quicktime Plugin for play > Flashanimations??? I don't know. If the Quicktime plugin uses the Flash plugin again, then you are vulnerable. If Quicktime has its own Flash interpreter, it might or might not be vulnerable.

Re: [SECURITY] Flash buffer overflow

2001-01-05 Thread Heiko Becker
-BEGIN PGP SIGNED MESSAGE- Ben Bucksch wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > A serious security problem in Macromedia's Shockwave Flash plugin > for all platforms and browsers has been published on BugTraq. > Exploited, it allows an attacker to run arbitary c

Re: [SECURITY] Flash buffer overflow

2001-01-04 Thread Jesse Ruderman
Use about:plugins to see if you have Flash set up in Mozilla or a derivative browser. That page will also tell you what directory it's in, which is useful if the settings were imported from Netscape 4.x.

[SECURITY] Flash buffer overflow

2001-01-03 Thread Ben Bucksch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A serious security problem in Macromedia's Shockwave Flash plugin for all platforms and browsers has been published on BugTraq. Exploited, it allows an attacker to run arbitary code on your machine. This means that an attacker would have the same rig