lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BFE07019.7265%gat0r@toughguy.net>
Date: Tue Jan  3 17:17:24 2006
From: gat0r at toughguy.net (gat0r)
Subject: WMF round-up, updates and de-mystification

If you are still running windows 98 or ME,  you are just plain wrong...


On 1/3/06 11:35 AM, "Nancy Kramer" <nekramer@...dtheater.net> wrote:

> Hello All,
> 
> I went to the patch site mentioned although I am currently running  a
> version of Windows it supposedly cannot help.  Down loaded and ran the
> vulnerability check program there expecting it to say that my system is
> vulnerable.  Interestingly it said it was not vulnerable.  I run Free AVG
> as my anti virus and a couple of updates came down today so possibly that
> did something.  Just thought I would pass this along.
> 
> Might be interesting to try it with other unpatched or unpatcheable
> versions of Windows running different types of anti virus.  Got a new
> computer with XP Pro a few days ago so will patch that and work to move
> into it sooner than I was planning.
> 
> I know quite a few home users who are still running Windows 98 and ME,
> possibly many will be vulnerable.
> 
> Regards,
> 
> Nancy Kramer
> Webmaster http://www.americandreamcars.com
> Free Color Picture Ads for Collector Cars
> One of the Ten Best Places To Buy or Sell a Collector Car on the Web
> 
> 
> 
> At 03:28 AM 1/3/2006, Gadi Evron wrote:
> 
>> Quite a bit of confusing and a vast amount of information coming from all
>> directions about the WMF 0day. Here are some URL's and generic facts to
>> set us straight.
>> 
>> The "patch" by Ilfak Guilfanov works, but by disabling a DLL in Windows.
>> So far no problems have been observed by anyone using this patch. You
>> should naturally check it out for yourselves but I and many others
>> recommend it until Microsoft bothers to show up with their own patch.
>> 
>> Ilfak is trusted and is in no way a Bad Guy.
>> 
>> You can find more information about it at his blog:
>> http://www.hexblog.com/2005/12/wmf_vuln.html
>> 
>> If you are still not sure about the patch by Ilfak, check out the
>> discussion of it going on in the funsec list about the patch, with Ilfak
>> participating:
>> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
>> Occasional information of new WMF problems keep coming in over there.
>> 
>> In this URL you can find the best summary I have seen of the WMF issue:
>> http://isc.sans.org/diary.php?storyid=994
>> by the "SANS ISC diary" team.
>> 
>> In this URL you can find the best write-up I have seen on the WMF issue:
>> http://blogs.securiteam.com/index.php/archives/167
>> By Matthew Murphy at the "Securiteam Blogs".
>> 
>> Also, it should be noted at this time that since the first public
>> discovery of this "problem", a new one has been coming in - every day. All
>> the ones seen so far are variants of the original and in all ways the SAME
>> problem. So, it would be best to acknowledge them as the same... or we
>> will keep having a NEW 0day which really isn't for about 2 months when all
>> these few dozen variations are exhausted.
>> 
>> A small BUT IMPORTANT correction for future generations:
>> The 0day was originally found and reported by Hubbard Dan from Websense on
>> a closed vetted security mailing list, and later on at the Websense public
>> page. All those who took credit for it took it wrongly.
>> 
>> Thanks, and a better new year to us all,
>> 
>>         Gadi.
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>> 
>> 
>> 
>> 
>> 
>> --
>> No virus found in this incoming message.
>> Checked by AVG Anti-Virus.
>> Version: 7.1.371 / Virus Database: 267.14.11/219 - Release Date: 1/2/2006
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ