lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200406291851.i5TIpDE7027268@web170.megawebservers.com> From: 1 at malware.com (http-equiv@...ite.com) Subject: SUPER SPOOF DELUXE : Take Two >Here's a quick and dirty demo injecting malware.com into >windowsupdate.microsoft.com :) >http://www.malware.com/targutted.html Thomas Kessler was kind enough to inform that this is not new, but in fact on old "issue" with Internet Explorer which by all accounts was supposed to be "patched" back in 1998[?]: Microsoft Security Program: Microsoft Security Bulletin (MS98- 020) Patch Available for 'Frame Spoof' Vulnerability http://www.microsoft.com/technet/security/bulletin/ms98-020.mspx Quite clearly this contraption known as Internet Explorer is just broken. It's oozing pus from every pore at this stage. If indeed the issues are the exact same. You'd better wipe hands of it anyway. We give up. -- http://www.malware.com