From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0268_01C5D292.17E551D0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
More quoting out of context. You're still having trouble with honest =
and maturity. Let's repeat.
Not for Windows XP SP2. You also have to ignore who is affected. =
But if you look only at the highest rating, assume that you are = affected,
and ignore thet the bulletins contain multiple issues, yes, = each may be
critical.
You still ignore that you claimed that eeye could own 95% of the =
worlds computers. This is false.
You still haven't been mature and honest enough to admit that you =
are wrong. Your reply to this thread suggests you will likely never be =
either mature enough or honest enough.
Rich
"Geo" wrote in message =
news:4352a7b0$3{at}w3.nls.net...
yeah, that's why Microsoft rates all 4 of the published ones as =
"critical".. I thought you always agree with the corp view?
Geo.
"Geo" wrote in message
news:43531276$2{at}w3.nls.net...
"Rich" wrote in message news:4352c3fb$1{at}w3.nls.net...
>> Not for Windows XP SP2.
And you keep reading only one exploit warning, what about this one
Severity:
High (Remote Code Execution)
Vendor:
Mircosoft
Systems Affected:
Windows Media Player 9 on Windows 98, 98SE, ME
Windows Media Player 9 on windows 2000 SP1 - SP4
Windows Media Player 9 on Widnows XP SP1 - SP2
Windows Media Player 9 on Windows Server 2003 SP1
Overview:
eEye Digital Security has discovered a vulnerability in the Windows =
Media
Player 9 AVI movie codec that allows memory at an arbitrary address to =
be
modified when a specially crafted AVI file is played. Exploitation of =
this
vulnerability can allow the execution of attacker-supplied code on a
victim's system with the privileges of the user who attempted to open =
the
movie file.
I've already showed you how easy it is to fire up your browser with a =
simple
PDF file, there are only about a million other ways to push you to a =
URL to
use this sort of exploit.
Geo.
------=_NextPart_000_0268_01C5D292.17E551D0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
More
quoting out of =
context. =20
You're still having trouble with honest and maturity. Let's=20
repeat.
Not for
Windows XP =
SP2. You=20
also have to ignore who is affected. But if you look only at the =
highest=20
rating, assume that you are affected, and ignore thet the bulletins =
contain=20
multiple issues, yes, each may be critical.
You still ignore that you =
claimed that=20
eeye could own 95% of the worlds computers. This is =
false.
You
still haven't been =
mature and=20
honest enough to admit that you are wrong. Your reply to this =
thread=20
suggests you will likely never be either mature enough or honest=20
enough.
Rich
"Geo" <georger{at}nls.net> wrote in message =
news:4352a7b0$3{at}w3.nls.net...
yeah, that's why Microsoft rates =
all 4 of the=20
published ones as "critical".. I thought you always agree with the =
corp=20
view?
Geo.
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
in message news:43531276$2{at}w3.nls.net..."Rich"=20
<{at}> wrote in message news:4352c3fb$1{at}w3.nls.net...=
>> =20
Not for Windows XP SP2.And you keep reading only one exploit =
warning,=20
what about this oneSeverity:High (Remote Code=20
Execution)Vendor:MircosoftSystems
=
Affected:Windows=20
Media Player 9 on Windows 98, 98SE, MEWindows Media Player 9 on =
windows=20
2000 SP1 - SP4Windows Media Player 9 on Widnows XP SP1 - =
SP2Windows=20
Media Player 9 on Windows Server 2003
SP1Overview:eEye =
Digital=20
Security has discovered a vulnerability in the Windows MediaPlayer =
9 AVI=20
movie codec that allows memory at an arbitrary address to =
bemodified when=20
a specially crafted AVI file is played. Exploitation of =
thisvulnerability=20
can allow the execution of attacker-supplied code on avictim's =
system with=20
the privileges of the user who attempted to open themovie=20
file.I've already showed you how easy it is to fire up your =
browser=20
with a simplePDF file, there are only about a million other ways =
to push=20
you to a URL touse this sort of=20
exploit.Geo.
------=_NextPart_000_0268_01C5D292.17E551D0--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267
|