lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY17-F13bmNmgHvnRQ00010539@hotmail.com>
Date: Fri, 26 Mar 2004 18:50:22 +0000
From: "C Ryll" <carolynryll@...mail.com>
To: bugtraq@...urityfocus.com
Subject: RE: MS Word - password protection vulnerabilty


So, if I patch, then I cannot bypass the password mechanisms. But if I do 
not patch, then I still can... Or does a patched application allow for the 
creation of a document in which the security controls cannot be bypassed 
using an unpatched MS Word? Can a document from an unpatched application 
still be bypassed in a patched MS Word?

It would be interesting to know the depth of patching in this situation.

Kind regards,
Carolyn


>s.zdrojewski@...irtualcommunity.net
>Sent by:
>"Sebastian \"En3py\" Zdrojewski" <en3py@...irtualcommunity.net>
>2004-03-26 01:57 AM
>
>
>To:     "'Andrew W Barkley'" <abarkle3@....com>
>bugtraq@...urityfocus.com
>cc:     (bcc: Carolyn Ryll/ATL-BTL/MS/PHILIPS)
>Subject:        R: UPDATED: MS Word - password protection vulnerabilty
>Classification:
>
>
>
>Actually these problems seems to be solved using SP3 of Office XP
>Published
>on MS04-009.
>
>Cheers
>

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar – get it now! 
http://toolbar.msn.com/go/onm00200415ave/direct/01/



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ