ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] Exploits for MS05-044, MS05-045, and MS05-048



http://isc.sans.org/diary.php?storyid=763

Published: 2005-10-14,
Last Updated: 2005-10-14 04:57:02 UTC by William Stearns (Version: 1) 

    Within two days, we already have proof-of-concept exploit code for
MS05-044, MS05-045, and MS05-048.  The three can be found at:
http://www.frsirt.com/exploits/20051013.ms05-048.c.php
Microsoft Collaboration Data Objects Buffer Overflow PoC Exploit
(MS05-048)
http://www.frsirt.com/exploits/20051013.ms05-045.c.php
Microsoft Windows Network Connection Manager Local DoS Exploit
(MS05-045)
http://www.frsirt.com/exploits/20051013.ms05-044.c.php
Microsoft Windows FTP Client File Location Tampering Exploit (MS05-044)
    Many thanks to John Otterson for noticing this.






 




Copyright © Lexa Software, 1996-2009.