____/ Adam Baum on Wednesday 24 October 2007 16:03 : \____
> Message-ID: <471f52e6$0$26414$88260bb3@xxxxxxxxxxxxxxxxx>
> From: "Adam Baum" <baum@xxxxxxxx>
> Newsgroups: comp.os.linux.advocacy
> Subject: Re: zero-day vuln in fully patched Win2K03 ..
> Date: Wed, 24 Oct 2007 11:03:41 -0400
> References: <ffnmkq$rli$1@xxxxxxxxxxxxxxx>
^^^^^^^^^^^^^^^^^^^^^^^^^^^
Seen this earlier. Nymshifting bastard.
*plonk*
> Lines: 13
> X-Priority: 3
> X-MSMail-Priority: Normal
> X-Newsreader: Microsoft Outlook Express 6.00.3790.3959
> X-RFC2646: Format=Flowed; Response
> X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.4073
> NNTP-Posting-Date: 24 Oct 2007 14:12:55 GMT
> X-Complaints-To: abuse@xxxxxxxxxxxx
> Xref: ellandroad.demon.co.uk comp.os.linux.advocacy:569997
>
> "Doug Mentohl" <doug_mentohl@xxxxxxxxxxxxx> wrote in message
> news:ffnmkq$rli$1@xxxxxxxxxxxxxxxxxx
>> 'Symantec .. successfully tested the exploit against fully patched Windows
>> XP-SP2 and Windows 2003-SP1 machines'
>>
>> http://blogs.zdnet.com/security/?p=603
>>
>
> "LOCAL USERS" only. Once local users have physical access to the machine
> there's dozens of ways to compromise it no matter what OS it's running.
|
|