<<<
Date Index
>>>
<<<
Thread Index
>>>
Re: Windows Installer msiexec GUID Buffer Overflow
To
:
bugtraq@xxxxxxxxxxxxxxxxx
Subject
: Re: Windows Installer msiexec GUID Buffer Overflow
From
:
0xjbrown41@xxxxxxxxx
Date
: 3 Jun 2008 14:25:59 -0000
List-help
: <
mailto:bugtraq-help@securityfocus.com
>
List-id
: <bugtraq.list-id.securityfocus.com>
List-post
: <
mailto:bugtraq@securityfocus.com
>
List-subscribe
: <
mailto:bugtraq-subscribe@securityfocus.com
>
List-unsubscribe
: <
mailto:bugtraq-unsubscribe@securityfocus.com
>
Mailing-list
: contact
bugtraq-help@xxxxxxxxxxxxxxxxx
; run by ezmlm
Other flags may be vulnerable as well. Microsoft has a thing for unicode.
Prev by Date:
[security bulletin] HPSBST02312 SSRT071428 rev.1 - HP StorageWorks Storage Mirroring Software, Remote Execution of Arbitrary Code
Next by Date:
[ GLSA 200806-02 ] libxslt: Execution of arbitrary code
Previous by thread:
RE: Windows Installer msiexec GUID Buffer Overflow
Next by thread:
[SECURITY] [DSA 1591-1] New libvorbis packages fix several vulnerabilities
Index(es):
Date
Thread