Re: 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

看板Bugtraq作者時間19年前 (2007/04/01 00:44), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串4/4 (看更多)
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig5815B4847E001C11C7954616 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Since exploit code has already been posted to Full-Disclosure, we are goi= ng to release an advisory with more technical details about the vulnerability. = Enjoy: http://www.determina.com/security.research/vulnerabilities/ani-header.htm= l Alex --------------enig5815B4847E001C11C7954616 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Cygwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGDilFTS+0yyhMJeMRAgOsAJ0XUaCEh8L3h0e6K6fmNLvH6vi3lwCdHWIZ zE7A4U1qdZnZZy7HWSYScdg= =t38e -----END PGP SIGNATURE----- --------------enig5815B4847E001C11C7954616--
文章代碼(AID): #163e_-00 (Bugtraq)
文章代碼(AID): #163e_-00 (Bugtraq)