[71114] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: "zero day" exploit...?

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Wed Jun 9 02:37:32 2004

Date: Wed, 09 Jun 2004 06:33:54 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <40C6AB78.1060901@sorbs.net>
To: Matthew Sullivan <matthew@sorbs.net>
Cc: nanog <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu



On Wed, 9 Jun 2004, Matthew Sullivan wrote:

>
> In case you haven't seen it...
>
> http://www.computerworld.com.au/index.php?id=117316298&eid=-255

yeah, yet another 'zero-day' (is it really zero-day with this?) IE
hole :( So again, why would you want to use this? (yes sean, there are
more holes in bind/sendmail/blah-unix-tool than ever in IE/Win*, but the
market base causes the huge scope of the problem, eh?)

oh well, block tcp/80 and tcp/443?

home help back first fref pref prev next nref lref last post