TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2005-10-16 20:42:14
subject: Re: Revisiting george`s false claims

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0268_01C5D292.17E551D0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   More quoting out of context.  You're still having trouble with honest =
and maturity.  Let's repeat.

     Not for Windows XP SP2.  You also have to ignore who is affected.  =
But if you look only at the highest rating, assume that you are = affected,
and ignore thet the bulletins contain multiple issues, yes, = each may be
critical.

    You still ignore that you claimed that eeye could own 95% of the =
worlds computers.  This is false.

     You still haven't been mature and honest enough to admit that you =
are wrong.  Your reply to this thread suggests you will likely never be =
either mature enough or honest enough.

  Rich

    "Geo"  wrote in message =
news:4352a7b0$3{at}w3.nls.net...
    yeah, that's why Microsoft rates all 4 of the published ones as =
"critical".. I thought you always agree with the corp view?

    Geo.





  "Geo"  wrote in message
news:43531276$2{at}w3.nls.net...
  "Rich"  wrote in message news:4352c3fb$1{at}w3.nls.net...

  >>   Not for Windows XP SP2.

  And you keep reading only one exploit warning, what about this one

  Severity:
  High (Remote Code Execution)

  Vendor:
  Mircosoft

  Systems Affected:
  Windows Media Player 9 on Windows 98, 98SE, ME
  Windows Media Player 9 on windows 2000 SP1 - SP4
  Windows Media Player 9 on Widnows XP SP1 - SP2
  Windows Media Player 9 on Windows Server 2003 SP1

  Overview:
  eEye Digital Security has discovered a vulnerability in the Windows =
Media
  Player 9 AVI movie codec that allows memory at an arbitrary address to =
be
  modified when a specially crafted AVI file is played. Exploitation of =
this
  vulnerability can allow the execution of attacker-supplied code on a
  victim's system with the privileges of the user who attempted to open =
the
  movie file.

  I've already showed you how easy it is to fire up your browser with a =
simple
  PDF file, there are only about a million other ways to push you to a =
URL to
  use this sort of exploit.

  Geo.


------=_NextPart_000_0268_01C5D292.17E551D0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   More
quoting out of =
context. =20
You're still having trouble with honest and maturity.  Let's=20
repeat.
 

  
     Not for
Windows XP =
SP2.  You=20
  also have to ignore who is affected.  But if you look only at the =
highest=20
  rating, assume that you are affected, and ignore thet the bulletins =
contain=20
  multiple issues, yes, each may be critical.
   
    You still ignore that you =
claimed that=20
  eeye could own 95% of the worlds computers.  This is =
false.
   
     You
still haven't been =
mature and=20
  honest enough to admit that you are wrong.  Your reply to this =
thread=20
  suggests you will likely never be either mature enough or honest=20
  enough.
  Rich
   
  
"Geo" <georger{at}nls.net> wrote in message = news:4352a7b0$3{at}w3.nls.net... yeah, that's why Microsoft rates = all 4 of the=20 published ones as "critical".. I thought you always agree with the = corp=20 view? Geo. "Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net> wrote=20 in message news:43531276$2{at}w3.nls.net..."Rich"=20 <{at}> wrote in message news:4352c3fb$1{at}w3.nls.net...= >> =20 Not for Windows XP SP2.And you keep reading only one exploit = warning,=20 what about this oneSeverity:High (Remote Code=20 Execution)Vendor:MircosoftSystems = Affected:Windows=20 Media Player 9 on Windows 98, 98SE, MEWindows Media Player 9 on = windows=20 2000 SP1 - SP4Windows Media Player 9 on Widnows XP SP1 - = SP2Windows=20 Media Player 9 on Windows Server 2003 SP1Overview:eEye = Digital=20 Security has discovered a vulnerability in the Windows MediaPlayer = 9 AVI=20 movie codec that allows memory at an arbitrary address to = bemodified when=20 a specially crafted AVI file is played. Exploitation of = thisvulnerability=20 can allow the execution of attacker-supplied code on avictim's = system with=20 the privileges of the user who attempted to open themovie=20 file.I've already showed you how easy it is to fire up your = browser=20 with a simplePDF file, there are only about a million other ways = to push=20 you to a URL touse this sort of=20 exploit.Geo. ------=_NextPart_000_0268_01C5D292.17E551D0-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.