[13495] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FW: Security Vulnerability with SMS 2.0 Remote Control

daemon@ATHENA.MIT.EDU (Maniac .)
Sun Jan 23 15:45:59 2000

Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-Id:  <20000121222422.3291.qmail@hotmail.com>
Date:         Fri, 21 Jan 2000 22:24:22 GMT
Reply-To: "Maniac ." <m_a_n_i_a_c_@HOTMAIL.COM>
From: "Maniac ." <m_a_n_i_a_c_@HOTMAIL.COM>
X-To:         Beisenmann@SCIENT.COM, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

This was originally reported back in December on another mailing list (Win2K
Security Advice).  Basically, as Frank suggested this isn't really a huge
security issue as proper ACL settings will guard against this problem.  But
it is important that people running SMS 2.0 are aware of this hole.

Probably another oversight on Microsoft's part, why would they not have the
install process of SMS 2.0 on each client take care of this.  Hopefully they
will decide to fix this in the next SMS 2.0 SP.


>Subject: FW: Security Vulnerability with SMS 2.0 Remote Control



-==-Man!ac-==-
"I don't intend to offend, I offend with my intent"

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

home help back first fref pref prev next nref lref last post