lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed,  4 Feb 2004 16:15:55 -0500
From: Luca Mihailescu <luca@...ailescu.net>
To: Willie G <gates@...rauded.us>
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com
Subject: Re: Multiple Vulnerabilities in Microsoft Vulnerabilities


You gotta be kidding me.This is one of the worst "disclosure" i've seen lately.

L.

Quoting Willie G <gates@...rauded.us>:

> 
> Multiple Vulnerabilities in Microsoft Vulnerabilities
> Original issue date: February 02, 2004
> Last revised: -- February 04, 2004
> Source: PERFIDIOUS DOT ORG SECURITY TEAM
> 
> Systems Affected
> 
> All Microsoft Products
> 
> Overview
> 
> Microsoft contains multiple vulnerabilities within their vulnerabilities
> the most serious of which could allow another vulnerability to execute
> another vulnerability and open a Pandora's box of vulnerabilities which
> can lead to a Denial of Service attack on an administrator's inbox.
> 
> Description
> 
> Microsoft Security Bulletins describe vulnerabilities. When issuing these
> vulnerability bulletins, Microsoft has been creating localhost based
> Denial of Service attacks on administrator mailboxes worldwide. The
> problem arises by various security organizations releasing too many
> Microsoft vulnerability alerts for programs which have security flaws.
> 
> /////
> gates@...rauded:~> mutt -y
> --- Mutt --- defrauded : ~/Maildir/.ms-sec  [ 1743765209473471876432 msgs
> 
> SEGMENTATION FAULT
> /////
> 
> Impact
> 
> This problem is becoming a costly one for administrators worldwide and a
> estimates show billions of dollars in losses incurred by this
> vulnerability because of the time spent sifting through these
> vulnerabilities, adding patches, updating, etc.
> 
> Solutions
> 
> Remove your email address from mailing lists which post Microsoft Security
> updates
> 
> Install an alternative Operating System
> 
> 
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> "That vulnerability is theoretical"
> 
> Willie G.
> gates@...fted.us
> Shafted US Security Team
> 00-212-555-1269
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists