lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316074654.ED98CF34@lists.grok.org.uk> Date: Thu Mar 16 07:54:54 2006 From: peak at argo.troja.mff.cuni.cz (peak@...o.troja.mff.cuni.cz) Subject: Advisory # [Thu Mar 16 02:46:47 EST 2006] # Off-by-one in Microsoft Access Advisory # [Thu Mar 16 02:46:47 EST 2006] # Off-by-one in Microsoft Access I. Background This vulnerability had no identified background. II. Description It is possible to make Microsoft Access crash by the use of malformed input. III. History 26-1-2006 - Vendor Notification. 1-2-2006 - Vendor Reply. 16-3-2006 - Public Disclosure. IV. Vendor Response Microsoft Access had offered no explanation about this vulnerability indentified. Appendix A Vendor Information http://www.microsoft.com Appendix B References RFC 9832