[19394] in bugtraq
Re: Microsoft Security Bulletin MS01-012 (fwd)
daemon@ATHENA.MIT.EDU (Weld Pond)
Tue Feb 27 16:33:04 2001
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-ID: <07aa01c0a046$5f333440$0b20010a@secureme>
Date: Mon, 26 Feb 2001 17:49:27 -0500
Reply-To: Weld Pond <weld@ATSTAKE.COM>
From: Weld Pond <weld@ATSTAKE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
We have revised our Microsoft vCard advisory:
http://www.atstake.com/research/advisories/2001/a022301-1.txt
to credit Joel Moses [joelmoses@MINDSPRING.COM] and list the related CVE
candidate number CVE#CAN-2000-0756. We should have caught that posting when
we did the research on this vulnerability.
Joel's posting described the issue as a denial of service and that is what
is listed as under CVE#CAN-2000-0756. Microsoft's hotfix policy, as I
understand it, is to not produce hotfixes for client DoS problems. They do
not consider them client security vulnerabilities. If the issue is a client
vulnerability allowing execution of arbitrary code they will create a
hotfix. We were able to execute arbitrary code with this overflow and
provide Microsoft with a proof of concept. From this they decided it was a
client vulnerability and created a hotfix.
weld
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0
iQA/AwUBOprdbqKvhX2AQSGyEQJtZACg5NuklFEpt35iYrSzeQIwIjtwMa8An0DY
2F5MGh1sq6jkrBFnwfq330Mj
=iCuN
-----END PGP SIGNATURE-----