Full Disclosure mailing list archives
Re: [CORE-2010-0405] Adobe Director Invalid Read
From: Core Security Technologies Advisories <advisories () coresecurity com>
Date: Thu, 13 May 2010 17:49:32 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies Advisories Errata: The vulnerability in advisory CORE-2010-0405 was incorrectly described as an Invalid read, when it is really a Memory corruption vulnerability. Updated Title: Adobe Director DIRAPI.DLL Memory Corruption Vulnerability Updated URL: http://www.coresecurity.com/content/adobe-director-memory-corruption -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkvsZboACgkQyNibggitWa20oQCgjqWZJeawrwtMs0E13rB4+veh F7MAn0WOo4rDimNR+jWhGErxrmjfK6U/ =iinS -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [CORE-2010-0405] Adobe Director Invalid Read Core Security Technologies Advisories Team (May 11)
- Re: [CORE-2010-0405] Adobe Director Invalid Read Core Security Technologies Advisories (May 13)