lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <BB52BCE8-5D7D-45C2-BF97-498C9EBAE11E@gmail.com> Date: Fri, 27 Nov 2009 11:15:00 +0300 From: webDEViL <w3bd3vil@...il.com> To: Ivan Security <ivanchukl@...il.com> Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk> Subject: Re: Microsoft Windows TCP/IP Timestamps Code Execution Vulnerability That's what binary diffing is all about. Sent from my iPhone On Nov 27, 2009, at 7:59 AM, Ivan Security <ivanchukl@...il.com> wrote: > Hi list, > > Has anyone more details about this vulnerability?. The advisory just > say: > "The vulnerability exists due to the TCP/IP stack not cleaning up > state information correctly. This causes the TCP/IP stack to > reference a field as a function pointer when it actually contains > other information" > I'd like to know a bit more in order to test it and make some > research. > > Regards, > > Ivan. > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists