lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20031016172137.96350.qmail@web41508.mail.yahoo.com>
From: illectro2001 at yahoo.com (Chris Sharp)
Subject: Foundstone Labs to Present Information on New Microsoft Vulnerabilities

What the fuck is this doing on Full Disclosure?

Foundstone didn't even have anything to do with the
discovery of these vulnerabilities, and yet your
posting this 'Briefing' to FD in the hope that someone
might associate you with this and give you some PR
props.

Go and stand in the corner and don't come back until
you have some original exploits for the list.

fuck'n corporate leeches

Chris

James Foster wrote:
> Foundstone Security Briefing:
> 
> MS03-041 through MS03-047 - Severe Vulnerabilities
from Messenger to 
> Exchange
> 
>  
> 
> Yesterday, Microsoft announced seven new patches for
a series of 
> critical vulnerabilities that will affect nearly
every Microsoft 
> customer. These vulnerabilities, named MS03-041
through MS03-047, are 
> found in the Microsoft Messenger service, Microsoft
Exchange, Outlook 
> Web Access, Windows Help and other popular Microsoft
software. The 
> impact of the vulnerabilities could be severe—many
of the issues are 
> buffer overruns that can result in remote code
execution on un-patched 
> hosts. The vulnerabilities that are remotely
exploitable bear 
> resemblance to previous Microsoft issues that were
widely exploited by 
> both remote attackers as well as worms that resulted
in widespread damage.
> 
>  
> 
> Foundstone is offering this Security Briefing as
part of a coordinated 
> effort designed to protect current customers and
other organizations, 
> globally.
> 
>  
> 
> Web Seminar Outline:
> 
> Introduction
> 
> Overview of the 7 New Microsoft Vulnerabilities
> 
> MS03-043 In-depth: Buffer Overrun in Messenger
Service
> 
> MS03-046/47 In-depth: Critical Vulnerabilities in MS
Exchange Server
> 
> The Other 4 Vulnerabilities: ActiveX, Authenticode &
More
> 
> Protective Measures
> 
> Questions and Answers
> 
>  
> 
> Presenters:
> 
> Brian Kenyon – Director of Product Services
> 
> Dave Cole – VP Product Management
> 
>  
> 
> Go to Foundstone’s Website – www.foundstone.com 
> <http://www.foundstone.com/> to register for the
these free briefings.
> 
>  
> 
> Enjoy and hope to see everyone there!
> 
>  
> 
> -Foster
> 
>  
> 
> ...
> 
> * *
> 
> *James C. Foster*
> 
> Director, Research and Development**
> 
> Foundstone, Inc.
> 
> /Strategic Security/
> 
>  
> 
> 949.297.5600 Tel
> 
> 949.463.3373 Mobile
> 
> 949.297.5575 Fax
> 
>  
> 
> http://www.foundstone.com
<http://www.foundstone.com/>
> 
>  
> 
> *software* | *services* | *education*
> 
>  
> 
> This email may contain confidential and privileged
information for the 
> sole use of the intended recipient. Any review or
distribution by others 
> is strictly prohibited. If you are not the intended
recipient, please 
> contact the sender and delete all copies of this
message. Thank you.
> 
>  
> 



__________________________________
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ