[41945] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WMF Exploit

daemon@ATHENA.MIT.EDU (Paul Laudanski)
Wed Jan 4 16:16:30 2006

Date: Tue, 3 Jan 2006 17:39:37 -0500 (EST)
From: Paul Laudanski <zx@castlecops.com>
To: Sam Munro <sam.munro@gmail.com>
Cc: Bill Busby <williambusby2001@yahoo.com>,
        "Hayes, Bill" <Bill.Hayes@owh.com>, <davidribyrne@yahoo.com>,
        <bugtraq@securityfocus.com>
In-Reply-To: <6debfea50601030717m557bbaf3i@mail.gmail.com>
Message-ID: <Pine.LNX.4.44.0601031737580.27958-100000@bugsbunny.castlecops.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Tue, 3 Jan 2006, Sam Munro wrote:

> I haven't seen this mentioned yet so I thought I would give you guys a
> heads-up a very good patch has been written by Ilfak
> Guilfanov<http://www.hexblog.com/2005/12/wmf_vuln.html> as
> a tempory solution until ms get their act together.
> 
> Can be downloaded here:
> http://www.hexblog.com/security/files/wmffix_hexblog14.exe

Ilfak's hexblog.com is down.  CastleCops is hosting the downloads now and 
there is a hexblog forum setup which Ilfak himself is moderating:

http://castlecops.com/f212-Hexblog.html

The downloads, etc can be found here:

http://castlecops.com/postlite143213-.html

-- 
Paul Laudanski, Microsoft MVP Windows-Security
[cal] http://events.castlecops.com
[de] http://de.castlecops.com
[en] http://castlecops.com
[wiki] http://wiki.castlecops.com
[family] http://cuddlesnkisses.com


home help back first fref pref prev next nref lref last post