lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200707101151.l6ABpgft015376@asti.maths.usyd.edu.au> Date: Tue, 10 Jul 2007 21:51:42 +1000 From: Paul Szabo <psz@...hs.usyd.edu.au> To: full-disclosure@...ts.grok.org.uk, seclists@...holm.com Subject: Re: Internet Explorer 0day exploit Thor Larholm wrote: > There is a URL protocol handler command injection vulnerability ... > http://larholm.com/2007/07/10/internet-explorer-0day-exploit/ I wonder whether this is essentially different from: Microsoft Internet Explorer 6 Protocol Handler Vulnerability http://www.securityfocus.com/archive/1/370959 http://www.securityfocus.com/archive/1/371061 http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/024833.html Please enlighten. Thanks, Paul Szabo psz@...hs.usyd.edu.au http://www.maths.usyd.edu.au/u/psz/ School of Mathematics and Statistics University of Sydney Australia _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/