[41925] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WMF round-up, updates and de-mystification

daemon@ATHENA.MIT.EDU (Gadi Evron)
Tue Jan 3 17:50:38 2006

Message-ID: <9157362a0601030356s6f392845p68d7d6419d0ccc1a@mail.gmail.com>
Date: Tue, 3 Jan 2006 13:56:46 +0200
From: Gadi Evron <gevron@gmail.com>
To: Pierre Vandevenne <pierre@datarescue.com>
Cc: Gadi Evron <ge@linuxbox.org>, "FunSec [List]" <funsec@linuxbox.org>,
        bugtraq@securityfocus.com
In-Reply-To: <1846049593.20060103124749@datarescue.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit

Hey Pierre!
I stand corrected although beyond my simplification, the URL's do a good job. :)

     Gadi.

On 1/3/06, Pierre Vandevenne <pierre@datarescue.com> wrote:
> Good Afternoon,
>
> Tuesday, January 3, 2006, 9:28:40 AM, you wrote:
>
> GE> The "patch" by Ilfak Guilfanov works, but by disabling a DLL in Windows.
>
> I wouldn't say it does that. If you really want to simplify it in the
> extreme, it hides the vulnerable function. The patch was, imho done
> precisely to avoid disabling the dll, and because disabling the dll
> wasn't necessarily successful in all cases.
>
> --
> Best regards,
> Pierre                            mailto:pierre@datarescue.com
>
>
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
>

home help back first fref pref prev next nref lref last post