[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041013141844.2D34B15F53B@mail.ngssoftware.com>
Date: Wed, 13 Oct 2004 15:37:26 +0100
From: "NGSSoftware Insight Security Research" <nisr@...software.com>
To: <vulnwatch@...nwatch.org>, <bugtraq@...urityfocus.com>
Subject: MSN Gaming Heartbeat Component Buffer Overflow
John Heasman of NGSSoftware has discovered a high risk
vulnerability in the Heartbeat component used on MSN related
gaming sites.
This vulnerability has now been fixed by Microsoft, and a fix
can be downloaded from the Microsoft Security website:
http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx
NGSSoftware are going to withhold details of this flaw for three
months. Full details will be published on the 19th of January 2005.
This three month window will allow users of MSN gaming related
sites the time needed to obtain the patch before the details are
released to the general public. This reflects NGSSoftware's new
approach to responsible disclosure.
This vulnerability, including many others identified and fixed by
Microsoft in this month's Cumulative Security Update, can be
detected by Typhon III - NGSSoftware's advanced vulnerability
scanner. Typhon III will rapidly detect hosts on your network
susceptible to these vulnerabilities and enable your organisation
to manage risk. For existing Typhon III customers, please use the
Typhon III update option to include these new vulnerability checks.
NGSSoftware Insight Security Research
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070
Powered by blists - more mailing lists