Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: New Internet Explorer code-execution
From: Georgi Guninski <guninski () guninski com>
Date: Thu, 11 Mar 2010 21:28:53 +0200

On Wed, Mar 10, 2010 at 11:59:05PM +0530, Pradip Sharma wrote:
Online thugs are exploiting a security bug in earlier versions of Internet
Explorer that allows them to remotely execute malicious code, Microsoft
warned on Tuesday.

http://www.theregister.co.uk/2010/03/09/internet_explorer_attacks/


haha, they updated their ``advisory'' to 1.1 from 1.0 at
http://www.microsoft.com/technet/security/advisory/981374.mspx

they changed ``targeted'' to ``public'' and the rest seems the same.

are targeted customers less important than public customers?

extra points for spelling eCHO as Echo:

Echo y| cacls %WINDIR%\SYSWOW64\iepeers.DLL /E /P everyone:N
Impact of workaround. Extended MSHTML functionality such as printing and
Web folders may be affected.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]