lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <00b901c377eb$eedc49e0$46145f80@crc.washington.edu>
From: cdevoney at u.washington.edu (Chris DeVoney)
Subject: EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

On Wednesday, September 10, 2003 1:26 PM, Jeff.Urnaza@...rydennison.com
wrote:

> The version number in eEye's supposed *new* scanner is the 
> same version number  as the one they release for the previous 
> RPC exploit, v1.0.4.

Pardon my interuption, but the version I downloaded about noon-ish PDT has
version 1.1.0 in both its Help-About and its file properties. It does report
vulnerabilities to MS03-026 and -039.


cdv

------------------------
Chris DeVoney
Clinical Research Center Informatics
University of Washington
cdevoney@...ashington.edu
206-598-6816 
------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ