Bugtraq mailing list archives
Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical
From: Juha-Matti Laurio <juha-matti.laurio () netti fi>
Date: Thu, 7 Dec 2006 20:22:09 +0200 (EET)
The related Trojans have the following names: Troj/DwnLdr-FXG http://www.sophos.com/security/analyses/trojdwnldrfxg.html and Troj/DwnLdr-FXH http://www.sophos.com/security/analyses/trojdwnldrfxh.html Other references released: BID: http://www.securityfocus.com/bid/21451 FrSIRT: http://www.frsirt.com/english/advisories/2006/4866 SecurityTracker: http://www.securitytracker.com/id?1017339 ISS: http://xforce.iss.net/xforce/xfdb/30738 SecuriTeam: http://www.securiteam.com/windowsntfocus/6I00220HPG.html US-CERT VU:http://www.kb.cert.org/vuls/id/167928
- Juha-MattiRyan Buena <dreamsbig () gmail com> wrote:
Source: http://secunia.com/advisories/23232/ Does anybody have any more detailed information on specifics about this vulnerability? There is very little detail concerning this. What actions is anyone taking against this? According to one article, Mcafee discovered this vulnerability and the word DOC would need to be launched in a browser.
Current thread:
- Microsoft 0-day word vulnerability - Secunia - Extremely critical Ryan Buena (Dec 06)
- Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical Andrew Simmons (Dec 07)
- <Possible follow-ups>
- Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical Juha-Matti Laurio (Dec 07)
- Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical schafer_jeffrey (Dec 14)
- Re: Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical schafer_jeffrey (Dec 14)