[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <006201c5d014$427033a0$c6392a0a@pabloxp>
Date: Thu Oct 13 17:00:07 2005
From: pablo at vernocchi.com.ar (Vernocchi, Pablo)
Subject: Microsoft Outlook Web Access
Hi Petko,
BIF:9409 has a solution:
http://www.securityfocus.com/bid/9409/solution
Anyway, I recommend you to use MBSA (Microsoft Baseline Security Analyzer)
once a week, to check issues; or Retina as well.
Also, there's a tool called Microsoft Exchange Best Practices Analyzer tool
that may help you troubleshooting non standard configs or non recommended
configs.
http://www.microsoft.com/exchange/downloads/2003/exbpa/default.mspx
Regards,
PV
-----Mensaje original-----
De: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] En nombre de Petko Petkov
Enviado el: Jueves, 13 de Octubre de 2005 06:22 a.m.
Para: full-disclosure@...ts.grok.org.uk
Asunto: [Full-disclosure] Microsoft Outlook Web Access
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello there,
I've been messing around with Microsoft Outlook Web Access (SP1)
trying to test and see what I can do. I found several vulnerabilities
on google/securityfocus related to this particular version but non of
them seem to work. I went to Microsoft website and I can't see any
patches available. Well, there is one fix that I really don't know
what is for.
Does any one know if BID:12459 and BID:9409 had been fixed?
If not, is there a way to prevent those attacks from happening?
Thanks
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (MingW32)
iD8DBQFDTic+Ff/6vxAyUpgRAgWgAJ9d+hpQ650dOfoZiQljAFtfeZJJ5QCgv6bO
mCC1wAHPw4vcA1bKPe45KJY=
=+TZH
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists