![]() |
Severe fuckup in IE and other Micro$uc$ products
A vulnerability identified in a library included in Windows XP and Internet Explorer version 4.0 and newer can be exploited to cause a DoS (Denial of Service) on certain applications.
The vulnerability is caused due to a NULL pointer dereference bug in Microsoft Shell Light-Weight Utility Library ("shlwapi.dll"). A malicious person can exploit the vulnerability by constructing a special HTML document, which will crash applications using the vulnerable library. An example was provided in the original advisory: (html) (form) (input type crash) (/form) (/html) Read the full buginfo here: http://www.secunia.com/advisories/8642/ |
deja vu all over again
|
| All times are GMT -7. The time now is 08:34 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123