Date: Wed, 27 Aug 2003 09:31:47 +0100
From: MeatballTurbo <carl.robsonnopsamcing-czechs.com>
Subject: Re: .. again with the fakakama patchs ..


In article <3F4C0B20.E42B52AEnopsamlamelame.org>, lamealameadingdongnopsamlamelame.org says... > Salutations: > > Heads up - doesn't appear to be another hippo floating by just yet - but MS > SQL/XML/Access/.NET looks like its up for another beating.. > > http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-033.asp > > http://www.symantec.com/avcenter/security/Content/8455.html > > Which brings up an important advise opportunity for all you folks out there > with healthy lives somewhere 25 feet beyond a stinking wall jack.. > > This particular buffer overrun is limited by the level of access you > provide the exploit when you - don't - setup a user account to do your > everyday surf 'n salary stuff on windows systems.. The Administrator > account is for administration.. Cheers. Forwarded onto our engineer team. Don't know if they have the details yet, but better safe. -- The poster formerly known as Skodapilot. http://www.bouncing-czechs.com

Return to Main Index

The content on this site may not be republished without permission. Copyright © 1988-2019 - The Saab Network - saabnet.com.
For usage guidelines, see the Saabnet.com Mission and Purpose Page.
[Contact | Site Map | Saabnet.com on Facebook | Saabnet.com on Twitter | Shop Amazon via TSN | Site Donations]