Full Disclosure mailing list archives
Re: New Internet Explorer code-execution
From: Georgi Guninski <guninski () guninski com>
Date: Thu, 11 Mar 2010 21:28:53 +0200
On Wed, Mar 10, 2010 at 11:59:05PM +0530, Pradip Sharma wrote:
Online thugs are exploiting a security bug in earlier versions of Internet Explorer that allows them to remotely execute malicious code, Microsoft warned on Tuesday. http://www.theregister.co.uk/2010/03/09/internet_explorer_attacks/
haha, they updated their ``advisory'' to 1.1 from 1.0 at http://www.microsoft.com/technet/security/advisory/981374.mspx they changed ``targeted'' to ``public'' and the rest seems the same. are targeted customers less important than public customers? extra points for spelling eCHO as Echo: Echo y| cacls %WINDIR%\SYSWOW64\iepeers.DLL /E /P everyone:N Impact of workaround. Extended MSHTML functionality such as printing and Web folders may be affected. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- New Internet Explorer code-execution Pradip Sharma (Mar 10)
- Re: New Internet Explorer code-execution Moshe Ben Abu (Mar 10)
- Re: New Internet Explorer code-execution Georgi Guninski (Mar 11)