lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <45780042.8020100@messagelabs.com> Date: Thu, 07 Dec 2006 11:51:30 +0000 From: Andrew Simmons <asimmons@...sagelabs.com> To: Ryan Buena <dreamsbig@...il.com> Cc: bugtraq@...urityfocus.com Subject: Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical Hi Ryan Ryan Buena wrote: > Source: http://secunia.com/advisories/23232/ > > Does anybody have any more detailed information on specifics about > this vulnerability? There is very little detail concerning this. SANS/ISC piece: http://isc.sans.org/diary.php?storyid=1913 Microsoft Advisory: http://www.microsoft.com/technet/security/advisory/929433.mspx A couple of lines on the MSRC blog about "reported PoC"; also mentions "limited attacks attempting to use the vulnerability": http://blogs.technet.com/msrc/archive/2006/12/06/microsoft-security-advisory-929433-posted.aspx cheers \a -- Andrew Simmons // MessageLabs Security Team Technical Security Consultant MessageLabs: Be certain ______________________________________________________________________ This email has been scanned by the MessageLabs Email Security System. For more information please visit http://www.messagelabs.com/email ______________________________________________________________________