[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2DFBD503BF11D140AAA56A1044FCFB8613DAB1FC@Pmal-na1.ghi.com>
From: OGoencz at ghi.com (Goencz, Otto)
Subject: Windows (XP SP2) Remote code execution with
parameters
On my box, WinXP with SP2, the PoC worked as described...
-----Original Message-----
From: ShredderSub7 SecExpert [mailto:shreddersub7@...mail.com]
Sent: Monday, December 27, 2004 7:24 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Windows (XP SP2) Remote code execution with
parameters
PoC (called CMDExe): http://www.freewebs.com/shreddersub7/htm.htm
Discussion: http://www.freewebs.com/shreddersub7/expl-discuss.htm
------------------Which systems are vulnerable?--------
Any system running any Microsoft Windows XP edition with Internet Explorer 6
or higher, even with SP2 applied.
Any system running any Microsoft Windows Server 2003 edition with Internet
Explorer 6 or higher.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041228/ca8542c0/attachment.html
Powered by blists - more mailing lists