lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c524f8960601051350v18b8e806k55bbd4101a437d4a@mail.gmail.com>
Date: Thu, 5 Jan 2006 15:50:36 -0600
From: Matthew Schiros <schiros@...il.com>
To: security-basics@...urityfocus.com, bugtraq@...urityfocus.com
Subject: WMF Exploit Patch Released


Microsoft has released a patch for the WMF exploit a couple of days
early, apparently due to a faster-than-expected testing process, and,
at least I hope, some consumer pressure.  It can be downloaded via
Windows Update, or as a standalone install at:

http://www.microsoft.com/technet/security/Bulletin/MS06-001.mspx

As a note, it appears that all of the attempts to circumvent the
problem via disabling SHIMGVW.DLL were irrelevant, and that those who
discovered that GDI32.DLL and WGDI32.DLL were the culprits were
correct.

Happy crawling.

Matt Schiros
Web Developer
Academic Superstore
www.academicsuperstore.com

---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management 
education and the case study affords you unmatched consulting experience. 
Tailor your education to your own professional goals with degree 
customizations including Emergency Management, Business Continuity Planning, 
Computer Emergency Response Teams, and Digital Investigations. 

http://www.msia.norwich.edu/secfocus
----------------------------------------------------------------------------



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ