lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6.0.1.1.2.20060103052718.04698970@mail.mindtheater.net>
Date: Tue Jan  3 09:58:40 2006
From: nekramer at mindtheater.net (Nancy Kramer)
Subject: WMF round-up, updates and
  de-mystification

Hello All,

I went to the patch site mentioned although I am currently running  a 
version of Windows it supposedly cannot help.  Down loaded and ran the 
vulnerability check program there expecting it to say that my system is 
vulnerable.  Interestingly it said it was not vulnerable.  I run Free AVG 
as my anti virus and a couple of updates came down today so possibly that 
did something.  Just thought I would pass this along.

Might be interesting to try it with other unpatched or unpatcheable 
versions of Windows running different types of anti virus.  Got a new 
computer with XP Pro a few days ago so will patch that and work to move 
into it sooner than I was planning.

I know quite a few home users who are still running Windows 98 and ME, 
possibly many will be vulnerable.

Regards,

Nancy Kramer
Webmaster http://www.americandreamcars.com
Free Color Picture Ads for Collector Cars
One of the Ten Best Places To Buy or Sell a Collector Car on the Web



At 03:28 AM 1/3/2006, Gadi Evron wrote:

>Quite a bit of confusing and a vast amount of information coming from all 
>directions about the WMF 0day. Here are some URL's and generic facts to 
>set us straight.
>
>The "patch" by Ilfak Guilfanov works, but by disabling a DLL in Windows. 
>So far no problems have been observed by anyone using this patch. You 
>should naturally check it out for yourselves but I and many others 
>recommend it until Microsoft bothers to show up with their own patch.
>
>Ilfak is trusted and is in no way a Bad Guy.
>
>You can find more information about it at his blog:
>http://www.hexblog.com/2005/12/wmf_vuln.html
>
>If you are still not sure about the patch by Ilfak, check out the 
>discussion of it going on in the funsec list about the patch, with Ilfak 
>participating:
>https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
>Occasional information of new WMF problems keep coming in over there.
>
>In this URL you can find the best summary I have seen of the WMF issue:
>http://isc.sans.org/diary.php?storyid=994
>by the "SANS ISC diary" team.
>
>In this URL you can find the best write-up I have seen on the WMF issue:
>http://blogs.securiteam.com/index.php/archives/167
>By Matthew Murphy at the "Securiteam Blogs".
>
>Also, it should be noted at this time that since the first public 
>discovery of this "problem", a new one has been coming in - every day. All 
>the ones seen so far are variants of the original and in all ways the SAME 
>problem. So, it would be best to acknowledge them as the same... or we 
>will keep having a NEW 0day which really isn't for about 2 months when all 
>these few dozen variations are exhausted.
>
>A small BUT IMPORTANT correction for future generations:
>The 0day was originally found and reported by Hubbard Dan from Websense on 
>a closed vetted security mailing list, and later on at the Websense public 
>page. All those who took credit for it took it wrongly.
>
>Thanks, and a better new year to us all,
>
>         Gadi.
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
>
>
>--
>No virus found in this incoming message.
>Checked by AVG Anti-Virus.
>Version: 7.1.371 / Virus Database: 267.14.11/219 - Release Date: 1/2/2006


-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.1.371 / Virus Database: 267.14.11/219 - Release Date: 1/2/2006


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ