Vulnerability Development mailing list archives

RE: Re: Buffer overflow?


From: "Silcock, Stephen" <stephen.silcock () cleanaway com au>
Date: Fri, 19 May 2006 09:41:50 +1000

"wzshlex1.dll"...

I'd say that James has hit the nail on the head - that's WinZip's shell
extensions.

S.   :) 

-----Original Message-----
From: ivancool2003 () yahoo com ar [mailto:ivancool2003 () yahoo com ar] 
Sent: Friday, 19 May 2006 8:48 AM
To: vuln-dev () securityfocus com
Subject: Re: Re: Buffer overflow?

Here is the event viewer information

0000: 41 70 70 6c 69 63 61 74   Applicat
0008: 69 6f 6e 20 46 61 69 6c   ion Fail
0010: 75 72 65 20 20 65 78 70   ure  exp
0018: 6c 6f 72 65 72 2e 65 78   lorer.ex
0020: 65 20 36 2e 30 2e 32 38   e 6.0.28
0028: 30 30 2e 31 31 30 36 20   00.1106 
0030: 69 6e 20 77 7a 73 68 6c   in wzshl
0038: 65 78 31 2e 64 6c 6c 20   ex1.dll 
0040: 34 2e 30 2e 30 2e 30 20   4.0.0.0 
0048: 61 74 20 6f 66 66 73 65   at offse
0050: 74 20 30 30 30 30 31 31   t 000011
0058: 30 30 0d 0a               00..   


This e-mail (and any attachments) may contain personal, confidential or legal or other professional privileged 
information and is intended solely for the named addressee. Any confidentiality or privilege is not waived or lost 
because this email has been sent to you by mistake. If you are not the intended recipient, you must not disclose it or 
use the information contained in it. If you have received this e-mail in error, please tell us immediately by return 
e-mail, delete it from your system and destroy any copies. Emails may be interfered with, may contain computer viruses 
or other defects and may not be successfully replicated on other systems. Brambles gives no warranties on these matters.


Please consider the environment before printing this email. Brambles is committed to achieving Zero Harm - zero 
injuries and zero environmental damage.


Current thread: