lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <43BAD127.9060108@gmail.com> Date: Tue, 03 Jan 2006 14:31:51 -0500 From: Joshua <joshua.broussard@...il.com> To: grasshopa@...il.com Cc: bugtraq@...urityfocus.com Subject: Re: WMF Exploit This is probably due to M$ thumbnail generation. You can disable that and see if it fixes the problem... grasshopa@...urityfocus.com wrote: >I've tested the exploit on XP home and I've found that it does not even need a single click on my machine. Once the folder containing the file is open (this was in list view) the exploit will run. > >Scary sh*t! > > >