lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <C778D0C8BC20D5119B6700D0B7B617A05C3E5A@DAYTONA>
From: ALudwig at Calfingroup.com (Andre Ludwig)
Subject: Anyone have more info on this?

http://support.microsoft.com/default.aspx?scid=kb;[LN];kb824105

New patch from MS, looks like a crafted NetBIOS request could return data
from memory.  Anyone seen any more info on this new exploit?  

I am interested in an actual packet capture of the packet in question. Or
other technical information surrounding this new exploit. 

Andre Ludwig, CISSP


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ