Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The related Trojans have the following names:

Troj/DwnLdr-FXG
http://www.sophos.com/security/analyses/trojdwnldrfxg.html
and
Troj/DwnLdr-FXH
http://www.sophos.com/security/analyses/trojdwnldrfxh.html

Other references released:

BID:
http://www.securityfocus.com/bid/21451
FrSIRT:
http://www.frsirt.com/english/advisories/2006/4866
SecurityTracker:
http://www.securitytracker.com/id?1017339
ISS:
http://xforce.iss.net/xforce/xfdb/30738
SecuriTeam:
http://www.securiteam.com/windowsntfocus/6I00220HPG.html
US-CERT VU:
http://www.kb.cert.org/vuls/id/167928
- Juha-Matti

Ryan Buena <dreamsbig@xxxxxxxxx> wrote:
Source: http://secunia.com/advisories/23232/

Does anybody have any more detailed information on specifics about
this vulnerability? There is very little detail concerning this. What
actions is anyone taking against this? According to one article,
Mcafee discovered this vulnerability and the word DOC would need to be
launched in a browser.


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux