| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Revisiting george`s false claims |
From: "Geo"
"Rich" wrote in message news:4352c3fb$1{at}w3.nls.net...
>> Not for Windows XP SP2.
And you keep reading only one exploit warning, what about this one
Severity:
High (Remote Code Execution)
Vendor:
Mircosoft
Systems Affected:
Windows Media Player 9 on Windows 98, 98SE, ME Windows Media Player 9 on
windows 2000 SP1 - SP4 Windows Media Player 9 on Widnows XP SP1 - SP2
Windows Media Player 9 on Windows Server 2003 SP1
Overview:
eEye Digital Security has discovered a vulnerability in the Windows Media
Player 9 AVI movie codec that allows memory at an arbitrary address to be
modified when a specially crafted AVI file is played. Exploitation of this
vulnerability can allow the execution of attacker-supplied code on a
victim's system with the privileges of the user who attempted to open the
movie file.
I've already showed you how easy it is to fire up your browser with a
simple PDF file, there are only about a million other ways to push you to a
URL to use this sort of exploit.
Geo.
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.