[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201009082200.o88M0IHg013340@bari.maths.usyd.edu.au>
Date: Thu, 9 Sep 2010 08:00:18 +1000
From: paul.szabo@...ney.edu.au
To: uuf6429@...il.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: KeePass version 2.12 <= Insecure DLL
Hijacking Vulnerability (dwmapi.dll)
Christian Sciberras <uuf6429@...il.com> wrote:
> MS issued a patch quite some time ago.
Would you be able to give a reference to that patch, and comment on
its relationship to the recent
Microsoft Security Advisory (2269637)
Insecure Library Loading Could Allow Remote Code Execution
http://www.microsoft.com/technet/security/advisory/2269637.mspx
?
> This "vulnerability" is no more on all of MS's OSes ...
> I ... tested ... the vulnerability didn't work).
May I suggest that you tested wrong: I followed
Online Binary Planting Exposure Test
http://lists.grok.org.uk/pipermail/full-disclosure/2010-September/076293.html
and it "worked" for me, on my patched-to-the-limit WinXP.
Cheers, Paul
Paul Szabo psz@...hs.usyd.edu.au http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics University of Sydney Australia
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists