<<< Date Index >>>     <<< Thread Index >>>

Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical



The related Trojans have the following names:

Troj/DwnLdr-FXG
http://www.sophos.com/security/analyses/trojdwnldrfxg.html
and
Troj/DwnLdr-FXH
http://www.sophos.com/security/analyses/trojdwnldrfxh.html

Other references released:

BID:
http://www.securityfocus.com/bid/21451
FrSIRT:
http://www.frsirt.com/english/advisories/2006/4866
SecurityTracker:
http://www.securitytracker.com/id?1017339
ISS:
http://xforce.iss.net/xforce/xfdb/30738
SecuriTeam:
http://www.securiteam.com/windowsntfocus/6I00220HPG.html
US-CERT VU:
http://www.kb.cert.org/vuls/id/167928
- Juha-Matti

Ryan Buena <dreamsbig@xxxxxxxxx> wrote:
Source: http://secunia.com/advisories/23232/

Does anybody have any more detailed information on specifics about
this vulnerability? There is very little detail concerning this. What
actions is anyone taking against this? According to one article,
Mcafee discovered this vulnerability and the word DOC would need to be
launched in a browser.