[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200604282000.k3SK0STc017415@turing-police.cc.vt.edu>
Date: Fri Apr 28 21:00:38 2006
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: MSIE (mshtml.dll) OBJECT tag vulnerability
On Fri, 28 Apr 2006 20:47:41 BST, Aaron Gray said:
> The only thing that I would add that ehat in an idea world firstly on
> finding a vulnerability that an advisory is made to the product producer
> then secondly to the list with an IDS fingerprint SNORT. Then not until a
> reasonable time to fix the vulnerability the proof of concept exploit is
> released (This gives time to hone the exploit as well :)
Sometimes (often, in fact) it's really hard to write a good SNORT signature
that can't be reverse-engineered to give up enough info to create a PoC....
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060428/9354ad63/attachment.bin
Powered by blists - more mailing lists