lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316190351.3B2A54EF4@lists.grok.org.uk> Date: Thu Mar 16 19:54:53 2006 From: research at sec-consult.com (research@...-consult.com) Subject: [Advisory] # x Thu Mar 16 14:03:42 EST 2006 x # Buffer Overflow in Microsoft Windows 2003 [Advisory] # x Thu Mar 16 14:03:42 EST 2006 x # Buffer Overflow in Microsoft Windows 2003 ===================================================== 1. BACKGROUND ===================================================== There has been no identified background commentary about this problem in question. ===================================================== 2. VENDOR RESPONSE ===================================================== Microsoft Windows 2003 was extended no explanation. ===================================================== 3. CVE INFORMATION ===================================================== The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-578364 to this issue ===================================================== APPENDIX A VENDOR INFORMATION ===================================================== http://www.microsoft.com