Microsoft Security Bulletin MS06-070
Submitted by ep on
http://www.microsoft.com/technet/security/bulletin/ms06-070.mspx - This is a remote exploit for Win2000 and a local exploit for WinXP.
This website is intended to bring you the latest news, how to's, tools and resources in Information Security. Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.
The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute. For a description of these principles, please see our About section.
In keeping with the spirit of the Institute, I encourage questions and open discussions about security. And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.
Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep
Submitted by ep on
http://www.microsoft.com/technet/security/bulletin/ms06-070.mspx - This is a remote exploit for Win2000 and a local exploit for WinXP.
Submitted by securityadmin on
http://www.microsoft.com/technet/security/bulletin/ms06-070.mspx - This is a remote exploit for Win2000 and a local exploit for WinXP.
Submitted by securityadmin on
There are three vulnerabilities for Internet Explorer 7 at this time.
Submitted by securityadmin on
Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.
Submitted by securityadmin on
It can can result in a DoS attack on any server that is using a version of openssl
(does not affect openssl versions earlier then 0.9.7). They have
patched openssl and released 0.9.7l and 0.9.8d.