lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <A0809F82-5BC2-4BA7-918D-FDACB4149F52@gmail.com> Date: Tue, 8 Nov 2011 19:10:37 -0300 From: Nahuel Grisolia <nahuel.grisolia@...il.com> To: Henri Salo <henri@...v.fi> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Microsoft Windows vulnerability in TCP/IP Could Allow Remote Code Execution (2588516) Kingcope, where's the exploit? :P On Nov 8, 2011, at 6:53 PM, Henri Salo wrote: > http://technet.microsoft.com/en-us/security/bulletin/ms11-083 > > "The vulnerability could allow remote code execution if an attacker sends a continuous flow of specially crafted UDP packets to a closed port on a target system." > > Microsoft did it once again. > > - Henri Salo > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists