lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20041108043400.30541.qmail@www.securityfocus.com> Date: 8 Nov 2004 04:34:00 -0000 From: Menashe Eliezer <menashe@...jan.com> To: bugtraq@...urityfocus.com Subject: Re: [Full-Disclosure] MSIE <IFRAME> and <FRAME> tag NAME property bufferoverflow PoC exploit (was: python does mangleme (with IE bugs!)) In-Reply-To: <BAY10-DAV29UqLpHkat00000751@...mail.com> The published exploit is working also with the <EMBED> tag, and not just with the <IFRAME> and the <FRAME> tags. Finjan's advisory can be found at: http://www.finjan.com/SecurityLab/AttackandExploitReports/alert_show.asp?attack_release_id=114 == Regards, Menashe Eliezer Senior application security architect Malicious Code Research Center Finjan Software http://www.finjan.com/mcrc Prevention is the best cure!
Powered by blists - more mailing lists