lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20041020182636.34195.qmail@web41709.mail.yahoo.com> From: alf1num3rik at yahoo.com (Stephen Jimson) Subject: MS04-032 Exploit for Microsoft Windows Metafile (.emf) Heap Overflow Microsoft Windows Metafile (.emf) Heap Overflow Exploit (MS04-032) http://www.k-otik.com/exploits/20041020.HOD-ms04032-emf-expl2.c.php * The vulnerability will be triggered by either viewing a malicious * file or by navigating to a directory, which contains a malicious * file and displays it as a thumbnail. * * Graphics Rendering Engine Vulnerability - CAN-2004-0209 * ------------------------------------------------------------------- * Tested on: * - Internet Explorer 6.0 (SP1) (iexplore.exe) * - Explorer (explorer.exe) * - Windows XP SP1 __________________________________ Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. http://promotions.yahoo.com/new_mail