lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun Jun 18 14:26:43 2006 From: ad at heapoverflow.com (ad@...poverflow.com) Subject: Excel 0-day? there will be much more 0day spreading like this in the futur I think because idefense pays such bug a really really ridiculous price , Zdi is the one only very good but they are very strict for accepting a bug. It looks like some dudes are taking much profits of this weakness selling to blackhats regarding the 2 office's threats actually hitting.... Denis Jedig wrote: > Paul Szabo wrote: > >> Ideas (PoC, workaround) anyone? > > As often, the information policy is more than unfortunate. No details > are given, the administrators are just advised to "update antivirus", > hole up in some dark corner and chew on a piece of blanket out of fear. > It's the same kind of ignorance regarding customer needs we have seen in > the case of the WMF vulnerability. > > Anybody any idea if the problem somehow relates to the Excel > vulnerability offered on eBay in Dec 05? > http://www.securityfocus.com/news/11363 > > Regards, > > Denis > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > > __________ NOD32 1.1606 (20060617) Information __________ > > This message was checked by NOD32 antivirus system. > http://www.eset.com > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: ad.vcf Type: text/x-vcard Size: 167 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060618/956ca987/ad.vcf
Powered by blists - more mailing lists