lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200608281641.06426.grisu@guru.at>
Date: Mon, 28 Aug 2006 16:41:02 +0200
From: Christoph Gruber <grisu@...u.at>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: [Advisory] % +Thu Mar 16 21:07:15 EST 2006+ %
	Local Privilege Escalation Vulnerability in Microsoft Windows XP

On Friday 17 March 2006 03:07 Christoph Gruber wrote:

I want to straiten out, that this posting does NOT come from me!

A look at the header clarifies that:

Return-Path: <full-disclosure-bounces@...ts.grok.org.uk>
Received: from mx4.noc.eunet-ag.at (mx4.noc.eunet-ag.at 
[193.154.160.127])
	 by imap02 (Cyrus v2.2.12-Red Hat 2.2.12-2tis) with LMTPA;
	 Fri, 17 Mar 2006 04:06:42 +0100
X-Sieve: CMU Sieve 2.2
Received: from lists.grok.org.uk (lists.grok.org.uk [195.184.125.51])
	by mx4.noc.eunet-ag.at (8.13.0/8.13.0) with ESMTP id k2H36baA024009
	for <list@...u.at>; Fri, 17 Mar 2006 04:06:38 +0100
Received: from lists.grok.org.uk (localhost [127.0.0.1])
	by lists.grok.org.uk (Postfix) with ESMTP id 14D5ABA7D;
	Fri, 17 Mar 2006 02:25:27 +0000 (GMT)
X-Original-To: full-disclosure@...ts.grok.org.uk
Delivered-To: full-disclosure@...ts.grok.org.uk
Received: from guru.at (85-31-186-26.blue.kundencontroller.de 
[85.31.186.26])
	by lists.grok.org.uk (Postfix) with SMTP id D9D93AECF
	for <full-disclosure@...ts.grok.org.uk>;
	Fri, 17 Mar 2006 02:07:50 +0000 (GMT)
From: Christoph Gruber <list@...u.at>
To: <full-disclosure@...ts.grok.org.uk>

Best regards

> [Advisory] % +Thu Mar 16 21:07:15 EST 2006+ % Local Privilege
> Escalation Vulnerability in Microsoft Windows XP
>
>
>
>
> ----------------------------
> o/ 卍 Background
> There had been no identified background commentary on this
> vulnerability indentified. ----------------------------
> 卍 \o Description
> Microsoft Windows XP incorrectly validates user input, making
> privilege escalation possible.
>
> ----------------------------
> o/ 卍 History
> 2/21/2006 o/ Vendor Notification.
> 3/16/2006 o/ Public Disclosure.
> ----------------------------
> 卍 \o Workaround
> There was no workarounds.
> ----------------------------
> o/ 卍 Vendor Response
> Microsoft Windows XP had extended no identified information.
>
>
> ----------------------------
> Contact
> Christoph Gruber lolville@...m.la
> 1-888-565-9428
> BEWARE THE JIZZTAPO!!!
>
>             ..
>         _ .' `.
>        /\)
>       / /
>      / /   /\
>      \ \  /  \
>   _   \ \/ /\ \
>  (/\   \  /  \ \
>   \ \  /  \   (Y )
>    \ \/ /\ \   ""
>     \  /  \ \
>      \/   / /
>          / /
>         ( Y)
>          ""
>
>
> CISSP GSAE CCE SSP-CNSA SSP-MPA GIPS CAP SSCP
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

-- 
Christoph Gruber
"Das Geheimnis der Freiheit ist der Mut." Perikles (ca.500-429)

Content of type "application/pgp-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ