Vulnerability Development mailing list archives
Re: Admin.dll (strings ./Admin.dll)
From: "TJ Jablonowski" <t.jablonowski () mail-2-go com>
Date: Tue, 18 Sep 2001 19:20:14 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sorry to say only safe versions are ie5.01-sp2, ie5.5-sp2 or ie6.0 ref Microsoft Security Bulletin ms-01-20 ref Knowledge base article Q290108 - ----- Original Message ----- From: "Robert D." <xkill () dingoblue net au> To: "w1re p4ir" <w1rep4ir () disinfo net> Cc: <incidents () securityfocus com>; <vuln-dev () securityfocus com> Sent: Tuesday, September 18, 2001 3:51 PM Subject: Re: Admin.dll (strings ./Admin.dll)
Here's where it inserts the javascript to open the evil readme.eml mime Buffer overflow.I'm I correct assuming this is the same problem discussed in MS00-043? In that case the following configurations are safe: IE 5.01 SP1 or later IE 5.5 or later ( except Windows 2000, sp1 safe?? ) -------------------------------------------------------------------- -------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
-----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> iQA/AwUBO6fWrW+7g8loOAk5EQLxFwCgg42DCLPmhvpsaABkEIHNGFpJiK4AoMQO gra8+7TRXEdETwrjLH4Ws3GW =IX9Z -----END PGP SIGNATURE-----
Current thread:
- Admin.dll (strings ./Admin.dll) w1re p4ir (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) Robert D. (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) Gary Flynn (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) Gary Flynn (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) TJ Jablonowski (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) Gary Flynn (Sep 18)
- <Possible follow-ups>
- RE: Admin.dll (strings ./Admin.dll) Isherwood Jeff C Contr AFRL/IFOSS (Sep 18)
- Re: Admin.dll (strings ./Admin.dll) Robert D. (Sep 18)