lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA276E90A5@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: FW: New Security Patches from Microsoft

 Agreed, I spoke a bit too fast. Peter Kruse e-mail me directly and
stated the same. Thanks for pointing that out.

> -----Original Message-----
> From: Larry Seltzer [mailto:larry@...ryseltzer.com] 
> Sent: Tuesday, January 11, 2005 2:04 PM
> To: Todd Towles; 'Mailing List - Full-Disclosure'
> Subject: RE: [Full-Disclosure] FW: New Security Patches from Microsoft
> 
> >>No IE patch, it would seem.
> 
> No, but...
> 
> > MS05-001 (Critical)Vulnerability in the Indexing Service 
> Could Allow 
> > Remote Code Execution (871250) Vulnerability in HTML Help 
> Could Allow 
> > Code Execution (890175) 
> > http://www.microsoft.com/technet/security/Bulletin/MS05-001.mspx
> > 
> > MS05-002 (Critical)
> > Vulnerability in Cursor and Icon Format Handling Could Allow Remote 
> > Code Execution (891711) 
> > http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx
> > 
> 
> Both of these address problems that have been exploited through IE.
> These are the ones that have gotten so much recent publicity.
> 
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ