[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.BSO.4.58.0402101239270.21300@rhiannon.precision-guesswork.com>
Date: Tue, 10 Feb 2004 12:40:54 -0800 (PST)
From: Tina Bird <tbird@...cision-guesswork.com>
To: Marc Maiffret <mmaiffret@...e.com>
Cc: Joe Blatz <sd_wireless@...oo.com>, BUGTRAQ@...urityfocus.com
Subject: RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption
On Tue, 10 Feb 2004, Marc Maiffret wrote:
> This attack can be performed through various encryption systems such as
> Kerberos and almost anything using CERTs... I am not sure about
> Microsofts wording in their advisory.
Microsoft also states that servers are likelier to be attacked using this
vulnerability than clients are, because they're likelier to be decoding
ASN.1 data. But if the vulnerable code can be accessed via LSASS.exe,
doesn't that mean all systems are at risk?
thanks for any info -- tbird
--
It doesn't have to be our fault to be our responsibility.
-- Paul Robertson
http://www.precision-guesswork.com
Log Analysis http://www.loganalysis.org
VPN http://vpn.shmoo.com
tbird's Security Alerts http://securecomputing.stanford.edu/alert.html
Powered by blists - more mailing lists