TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo
date: 2005-10-17 06:26:38
subject: Re: Revisiting george`s false claims

From: "Geo" 

This is a multi-part message in MIME format.

------=_NextPart_000_00B2_01C5D2E3.BB06EE90
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

You are responding to a post with a quote that says XPsp2-vulnerable to =
the media player exploit. What part of that do you not understand?

Geo.
  "Rich"  wrote in message news:43531d27{at}w3.nls.net...
     More quoting out of context.  You're still having trouble with =
honest and maturity.  Let's repeat.

       Not for Windows XP SP2.  You also have to ignore who is affected. =
 But if you look only at the highest rating, assume that you are =
affected, and ignore thet the bulletins contain multiple issues, yes, =
each may be critical.

      You still ignore that you claimed that eeye could own 95% of the =
worlds computers.  This is false.

       You still haven't been mature and honest enough to admit that you =
are wrong.  Your reply to this thread suggests you will likely never be =
either mature enough or honest enough.

    Rich

      "Geo"  wrote in message =
news:4352a7b0$3{at}w3.nls.net...
      yeah, that's why Microsoft rates all 4 of the published ones as =
"critical".. I thought you always agree with the corp view?

      Geo.





    "Geo"  wrote in message =
news:43531276$2{at}w3.nls.net...
    "Rich"  wrote in message news:4352c3fb$1{at}w3.nls.net...

    >>   Not for Windows XP SP2.

    And you keep reading only one exploit warning, what about this one

    Severity:
    High (Remote Code Execution)

    Vendor:
    Mircosoft

    Systems Affected:
    Windows Media Player 9 on Windows 98, 98SE, ME
    Windows Media Player 9 on windows 2000 SP1 - SP4
    Windows Media Player 9 on Widnows XP SP1 - SP2
    Windows Media Player 9 on Windows Server 2003 SP1

    Overview:
    eEye Digital Security has discovered a vulnerability in the Windows =
Media
    Player 9 AVI movie codec that allows memory at an arbitrary address =
to be
    modified when a specially crafted AVI file is played. Exploitation =
of this
    vulnerability can allow the execution of attacker-supplied code on a
    victim's system with the privileges of the user who attempted to =
open the
    movie file.

    I've already showed you how easy it is to fire up your browser with =
a simple
    PDF file, there are only about a million other ways to push you to a =
URL to
    use this sort of exploit.

    Geo.


------=_NextPart_000_00B2_01C5D2E3.BB06EE90
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








You are responding to a post with a =
quote that says=20
XPsp2-vulnerable to the media player exploit. What part of that do you = not=20
understand?
 
Geo.
"Rich" <{at}> wrote in message news:43531d27{at}w3.nls.net... More quoting out of = context. =20 You're still having trouble with honest and maturity. Let's=20 repeat. Not for Windows XP = SP2. You=20 also have to ignore who is affected. But if you look only at = the=20 highest rating, assume that you are affected, and ignore thet the = bulletins=20 contain multiple issues, yes, each may be critical. You still ignore that you = claimed that=20 eeye could own 95% of the worlds computers. This is=20 false. You still haven't been = mature and=20 honest enough to admit that you are wrong. Your reply to this = thread=20 suggests you will likely never be either mature enough or honest=20 enough. Rich
"Geo" <georger{at}nls.net> wrote in = message news:4352a7b0$3{at}w3.nls.net... yeah, that's why Microsoft rates = all 4 of the=20 published ones as "critical".. I thought you always agree with the = corp=20 view? Geo. "Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:43531276$2{at}w3.nls.net..."Rich"=20 <{at}> wrote in message news:4352c3fb$1{at}w3.nls.net...= >> =20 Not for Windows XP SP2.And you keep reading only one exploit = warning, what about this oneSeverity:High (Remote Code=20 Execution)Vendor:MircosoftSystems = Affected:Windows=20 Media Player 9 on Windows 98, 98SE, MEWindows Media Player 9 on = windows=20 2000 SP1 - SP4Windows Media Player 9 on Widnows XP SP1 - = SP2Windows=20 Media Player 9 on Windows Server 2003 SP1Overview:eEye = Digital=20 Security has discovered a vulnerability in the Windows = MediaPlayer 9 AVI=20 movie codec that allows memory at an arbitrary address to = bemodified=20 when a specially crafted AVI file is played. Exploitation of=20 thisvulnerability can allow the execution of attacker-supplied = code on=20 avictim's system with the privileges of the user who attempted = to open=20 themovie file.I've already showed you how easy it is to = fire up=20 your browser with a simplePDF file, there are only about a = million other=20 ways to push you to a URL touse this sort of=20 exploit.Geo. ------=_NextPart_000_00B2_01C5D2E3.BB06EE90-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.