lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3414163395.20031015221023@scansoft.com>
From: tamas.wallner at scansoft.com (waces)
Subject: Fwd: [VulnWatch] 5 Windows vulnerabilities for October 2003 (4 critical, 1 important)

Microsoft has moved to a monthly bulletin schedule.

*Critical*

Vulnerability in Authenticode Verification Could Allow Remote Code
Execution (823182)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-041.asp

Buffer Overflow in Windows Troubleshooter ActiveX Control Could Allow Code
Execution (826232)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-042.asp

Buffer Overrun in Messenger Service Could Allow Code Execution (828035)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-043.asp

Buffer Overrun in Windows Help and Support Center Could Lead to System
Compromise (825119)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-044.asp


*Important*

Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code
Execution (824141)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-045.asp
-- 
Wallner 'Waces' Tamas
IT Administrator
ScanSoft-Recognita Corp.
Phone: +36-1-4128-729
Mobile: +36-30-992-5191


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ