[19394] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft Security Bulletin MS01-012 (fwd)

daemon@ATHENA.MIT.EDU (Weld Pond)
Tue Feb 27 16:33:04 2001

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-ID:  <07aa01c0a046$5f333440$0b20010a@secureme>
Date:         Mon, 26 Feb 2001 17:49:27 -0500
Reply-To: Weld Pond <weld@ATSTAKE.COM>
From: Weld Pond <weld@ATSTAKE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


We have revised our Microsoft vCard advisory:
http://www.atstake.com/research/advisories/2001/a022301-1.txt
to credit Joel Moses [joelmoses@MINDSPRING.COM] and list the related CVE
candidate number CVE#CAN-2000-0756. We should have caught that posting when
we did the research on this vulnerability.

Joel's posting described the issue as a denial of service and that is what
is listed as under CVE#CAN-2000-0756. Microsoft's hotfix policy, as I
understand it, is to not produce hotfixes for client DoS problems.  They do
not consider them client security vulnerabilities. If the issue is a client
vulnerability allowing execution of arbitrary code they will create a
hotfix.  We were able to execute arbitrary code with this overflow and
provide Microsoft with a proof of concept.  From this they decided it was a
client vulnerability and created a hotfix.

weld


-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBOprdbqKvhX2AQSGyEQJtZACg5NuklFEpt35iYrSzeQIwIjtwMa8An0DY
2F5MGh1sq6jkrBFnwfq330Mj
=iCuN
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post