lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316191935.688225719@lists.grok.org.uk> Date: Thu Mar 16 20:49:38 2006 From: psirt at cisco.com (Cisco Systems Product Security Incident Response Team) Subject: -Advisory- # =Thu Mar 16 14:19:33 EST 2006= # Buffer Overflow in Microsoft Access -Advisory- # =Thu Mar 16 14:19:33 EST 2006= # Buffer Overflow in Microsoft Access o/ 卍 HISTORY 25/1/2006 o/ Vendor Notification. 1/2/2006 o/ Vendor Reply. 16/3/2006 o/ Public Disclosure. 卍 \o WORKAROUND This problem had no workarounds on this vulnerability at hand. o/ 卍 VENDOR RESPONSE Microsoft Access was presented no identified commentary on this vulnerability indentified. CONTACT Cisco Systems Product Security Incident Response Team lolville@...m.la 1-888-565-9428 BEWARE THE JIZZTAPO!!! .. _ .' `. /\) / / / / /\ \ \ / \ _ \ \/ /\ \ (/\ \ / \ \ \ \ / \ (Y ) \ \/ /\ \ "" \ / \ \ \/ / / / / ( Y) "" CISSP CEH CSFA GREM SSP-MPA GWAS