| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ISS warns of new Microsoft Windows flaw |
From: /m Yup, I remember Geo. telling that story. It was two or three years ago, if my memory serves me well. /m On Tue, 01 Aug 2006 20:02:19 -0400, "John Beamish" wrote: >Reminds me of Geo's story when he diligently tracked and cross-referenced >access info, IP addresses, etc. (I don't remember exaclty) to get some >info on a guy who was visiting a site/discussion group Geo. went to. > >Finally, Geo. had him pinpointed and the next time he came online Geo told >him what he knew. The discussion went on for a bit and then the guy said >"Sorry." And Geo's NT session blue-screened. > >Or something like that. Geo. can provide all the details. > >On Tue, 01 Aug 2006 18:43:40 -0400, /m wrote: > >> >> http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci12063 48,00.html >> >> === >> Multiple versions of Microsoft Windows are vulnerable to a NULL pointer >> dereference error in the server driver, which attackers could exploit to >> crash a system using a specially crafted network packet. Atlanta-based >> vendor Internet Security Systems' (ISS) X-Force uncovered the glitch and >> released details Friday in an advisory, warning that an exploit is >> available in the wild. >> >> "Attackers can reliably cause Microsoft Windows to [go to a] blue >> screen," ISS said. "Users must reboot to recover from the crash … As of >> this writing no patch is available for the vulnerability." >> >> ISS said the security hole affects: >> Microsoft Windows 2000 SP4 >> Microsoft Windows Server 2003 >> Microsoft Windows Server 2003 Itanium >> Microsoft Windows Server 2003 SP1 >> Microsoft Windows Server 2003 SP1 Itanium >> Microsoft Windows Server 2003 x64 Edition >> Microsoft Windows XP Pro x64 Edition >> Microsoft Windows XP SP1 >> Microsoft Windows XP SP2 >> === >> >> /m --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.