[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a116aff00606231116jcd0cb09w515e5df1d3ad05a3@mail.gmail.com>
Date: Fri, 23 Jun 2006 23:16:32 +0500
From: naveed <naveedafzal@...il.com>
To: "Steven M. Christey" <coley@...re.org>
Cc: bugtraq@...urityfocus.com
Subject: Re: MS Excel Remote Code Execution POC Exploit
This is an exploit for the microsoft hlink.dll buffer overflow which
is used while handling hyperlinks in microsoft office. The related
MSRC blog entry is located here
http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx
On 6/23/06, Steven M. Christey <coley@...re.org> wrote:
>
> > * Advisories:
> > * http://www.microsoft.com/technet/security/advisory/921365.mspx
> > * http://www.securityfocus.com/bid/18422/
>
> There are at least three separate Excel issues that were published in
> the past week. These references suggest that it's the "zero-day"
> exploit from last Friday (CVE-2006-3059).
>
> However, the Microsoft blog and CERT advisories do not provide any
> details about that issue, not even about the bug type.
>
> So, it's not clear to me whether this is really an exploit for last
> Friday's zero-day, or if this is actually a brand new vulnerability.
>
> Any clarification would be appreciated.
>
> - Steve
>
Powered by blists - more mailing lists