In case you haven't seen it... http://www.computerworld.com.au/index.php?id=117316298&eid=-255 / Mat
On Wed, 9 Jun 2004, Matthew Sullivan wrote:
In case you haven't seen it...
http://www.computerworld.com.au/index.php?id=117316298&eid=-255
yeah, yet another 'zero-day' (is it really zero-day with this?) IE hole :( So again, why would you want to use this? (yes sean, there are more holes in bind/sendmail/blah-unix-tool than ever in IE/Win*, but the market base causes the huge scope of the problem, eh?) oh well, block tcp/80 and tcp/443?
On Wed, 9 Jun 2004, Matthew Sullivan wrote:
In case you haven't seen it...
http://www.computerworld.com.au/index.php?id=117316298&eid=-255
The good news is Windows XP Service Pack 2 blocks the attack. The bad news is XP/SP2 is still in beta. The double-bad news is XP/SP2 is only for XP; so "legacy" Microsoft users are still out of luck. Full Disclosure has been discussing the details.
Hmm is this the same as the help file problem recently patched for Safari in Mac OSX? Steve On Wed, 9 Jun 2004, Matthew Sullivan wrote:
In case you haven't seen it...
http://www.computerworld.com.au/index.php?id=117316298&eid=-255
/ Mat
participants (4)
-
Christopher L. Morrow
-
Matthew Sullivan
-
Sean Donelan
-
Stephen J. Wilcox