Not really... Check out most vulnerabilities found on bugtraq... Most of them were, and still are buffer overflown... Regards, Eduardo Herrmann de Freitas Indústrias Reunidas Ibéria S/A Suporte Técnico/Administração de Sistemas eduardofreitas@xxxxxxxxxxxx - 55-11-5501-9485 -----Mensagem original----- De: windows2000-bounce@xxxxxxxxxxxxx [mailto:windows2000-bounce@xxxxxxxxxxxxx] Em nome de Jim.Walls@xxxxxxx Enviada em: quarta-feira, 3 de setembro de 2003 17:56 Para: windows2000@xxxxxxxxxxxxx Assunto: [windows2000] Re: Office Security Alert Greg Reese posted (in tiny part): > As detailed in Microsoft's security bulletin, a malicious user > could create a document with a VBA application that's designed > to overflow the buffer--the chunk of memory that's allocated > to a program--and then run other code. What is it about Microsoft and buffer overflows? It seems that the vast majority of these security vulnerabilities make use of buffer overflows. It's just not that hard to write code that does not have that problem! Good grief! ----------------------- Jim Walls - K6CCC k6ccc@xxxxxxxxx Mobile Radio Operations Southern California Edison Co. Ofc: 626-302-8515 - PAX 28-515 FAX: 626-302-7501 - PAX 27-501 ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm