[41961] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WMF Exploit

daemon@ATHENA.MIT.EDU (Joshua)
Thu Jan 5 08:59:04 2006

Message-ID: <43BAD127.9060108@gmail.com>
Date: Tue, 03 Jan 2006 14:31:51 -0500
MIME-Version: 1.0
To: grasshopa@gmail.com
Cc: bugtraq@securityfocus.com
In-Reply-To: <20060101232913.27119.qmail@securityfocus.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
From: Joshua <joshua.broussard@gmail.com>

This is probably due to M$ thumbnail generation. You can disable that 
and see if it fixes the problem...

grasshopa@securityfocus.com wrote:

>I've tested the exploit on XP home and I've found that it does not even need a single click on my machine. Once the folder containing the file is open (this was in list view) the exploit will run.
>
>Scary sh*t!
>
>  
>


home help back first fref pref prev next nref lref last post