lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041020182636.34195.qmail@web41709.mail.yahoo.com>
From: alf1num3rik at yahoo.com (Stephen Jimson)
Subject: MS04-032 Exploit for Microsoft Windows Metafile (.emf) Heap Overflow

Microsoft Windows Metafile (.emf) Heap Overflow
Exploit (MS04-032)

http://www.k-otik.com/exploits/20041020.HOD-ms04032-emf-expl2.c.php

 * The vulnerability will be triggered by either
viewing a malicious 
 * file or by navigating to a directory, which
contains a malicious 
 * file and displays it as a thumbnail. 
 * 
 * Graphics Rendering Engine Vulnerability -
CAN-2004-0209 
 *
-------------------------------------------------------------------

 * Tested on: 
 *    - Internet Explorer 6.0 (SP1) (iexplore.exe) 
 *    - Explorer (explorer.exe) 
 *    - Windows XP SP1 




		
__________________________________
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ