TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo
date: 2005-10-16 22:55:58
subject: Re: Revisiting george`s false claims

From: "Geo" 

"Rich"  wrote in message news:4352c3fb$1{at}w3.nls.net...

>>   Not for Windows XP SP2.

And you keep reading only one exploit warning, what about this one

Severity:
High (Remote Code Execution)

Vendor:
Mircosoft

Systems Affected:
Windows Media Player 9 on Windows 98, 98SE, ME Windows Media Player 9 on
windows 2000 SP1 - SP4 Windows Media Player 9 on Widnows XP SP1 - SP2
Windows Media Player 9 on Windows Server 2003 SP1

Overview:
eEye Digital Security has discovered a vulnerability in the Windows Media
Player 9 AVI movie codec that allows memory at an arbitrary address to be
modified when a specially crafted AVI file is played. Exploitation of this
vulnerability can allow the execution of attacker-supplied code on a
victim's system with the privileges of the user who attempted to open the
movie file.

I've already showed you how easy it is to fire up your browser with a
simple PDF file, there are only about a million other ways to push you to a
URL to use this sort of exploit.

Geo.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.