Dear Kazennov, Vladimir,
DoS атака против Microsoft Internet Explorer? Ну я такие даже не
публикую :)
--Monday, December 19, 2005, 3:19:48 PM, you wrote to
security-alerts@xxxxxxxxxxxxxx:
KV> Коллеги, а вот и что-то более реальное - если кто-то будет
KV> анализировать, скажите, насколько это серьезно.
KV> ----------
KV> Message: 3
KV> Date: Mon, 19 Dec 2005 11:52:52 +0100
KV> From: "ad@xxxxxxxxxxxxxxxx" <ad@xxxxxxxxxxxxxxxx>
KV> Subject: [Full-disclosure] 2x 0day Microsoft Windows Excel
KV> To: full-disclosure@xxxxxxxxxxxxxxxxx, vulnwatch@xxxxxxxxxxxxx
KV> Message-ID: <43A69104.9080904@xxxxxxxxxxxxxxxx>
KV> Content-Type: text/plain; charset="iso-8859-1"
KV> -----BEGIN PGP SIGNED MESSAGE-----
KV> Hash: SHA1
KV> Let's go on the fast publishing :)
KV> I wont bother to message microsoft about this because they wont patch it
KV> for sure according that they can't patch fully exploitable bugs in a
KV> decent time, they do not patch IE dos
KV> (http://heapoverflow.com/IEcrash.htm), so no way to bother them, we
KV> should let them sleep a bit shhh ;)
KV> Bugs 1 and Bugs 2 are quite similiar but NOT, both are null pointer bugs
KV> . In bug1 you should mod a grafic's pointer to point to a bad area, and
KV> in bug 2 you should null out the size of the page name.
KV> attached are the 2 pocs, nor here are direct links
KV> http://heapoverflow.com/excelol/bug1.xls
KV> http://heapoverflow.com/excelol/bug2.xls
KV> Credits:
KV> AD [at] heapoverflow.com
--
~/ZARAZA
Ибо факты есть факты, и изложены они лишь для того, чтобы их поняли и в них
поверили. (Твен)