| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: winzip exploit |
From: Typical M$ User On Fri, 27 Feb 2004 13:22:11 -0500, "Geo." blurted: >WinZip MIME Parsing Buffer Overflow Vulnerability >iDEFENSE Security Advisory 02.27.04a: >http://www.idefense.com/application/poi/display?id=76&type=vulnerabiliti >When providing long strings to >certain parameters of MIME archives (.mim, .uue, .uu, .b64, .bhx, .hqx >and .xxe extensions) WinZip will crash referencing an "internal error in >file misc.c line 132". Thanks --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.