| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316191935.688225719@lists.grok.org.uk>
Date: Thu Mar 16 20:49:38 2006
From: psirt at cisco.com (Cisco Systems Product Security Incident Response Team)
Subject: -Advisory- # =Thu Mar 16 14:19:33 EST 2006= #
Buffer Overflow in Microsoft Access
-Advisory- # =Thu Mar 16 14:19:33 EST 2006= # Buffer Overflow in Microsoft Access
o/ 卍 HISTORY
25/1/2006 o/ Vendor Notification.
1/2/2006 o/ Vendor Reply.
16/3/2006 o/ Public Disclosure.
卍 \o WORKAROUND
This problem had no workarounds on this vulnerability at hand.
o/ 卍 VENDOR RESPONSE
Microsoft Access was presented no identified commentary on this vulnerability indentified.
CONTACT
Cisco Systems Product Security Incident Response Team lolville@...m.la
1-888-565-9428
BEWARE THE JIZZTAPO!!!
..
_ .' `.
/\)
/ /
/ / /\
\ \ / \
_ \ \/ /\ \
(/\ \ / \ \
\ \ / \ (Y )
\ \/ /\ \ ""
\ / \ \
\/ / /
/ /
( Y)
""
CISSP CEH CSFA GREM SSP-MPA GWAS