[windows2000] RES: Re: Office Security Alert

  • From: "Eduardo Freitas" <eduardofreitas@xxxxxxxxxxxx>
  • To: <windows2000@xxxxxxxxxxxxx>
  • Date: Fri, 5 Sep 2003 14:06:07 -0300

Not really... Check out most vulnerabilities found on bugtraq...
Most of them were, and still are buffer overflown...

Regards,
 
Eduardo Herrmann de Freitas
Indústrias Reunidas Ibéria S/A
Suporte Técnico/Administração de Sistemas
eduardofreitas@xxxxxxxxxxxx - 55-11-5501-9485
 

-----Mensagem original-----
De: windows2000-bounce@xxxxxxxxxxxxx
[mailto:windows2000-bounce@xxxxxxxxxxxxx] Em nome de Jim.Walls@xxxxxxx
Enviada em: quarta-feira, 3 de setembro de 2003 17:56
Para: windows2000@xxxxxxxxxxxxx
Assunto: [windows2000] Re: Office Security Alert

Greg Reese posted (in tiny part):
> As detailed in Microsoft's security bulletin, a malicious user
> could create a document with a VBA application that's designed
> to overflow the buffer--the chunk of memory that's allocated
> to a program--and then run other code.

What is it about Microsoft and buffer overflows?  It seems that the vast
majority of these security vulnerabilities make use of buffer overflows.
It's just not that hard to write code that does not have that problem!
Good grief!

-----------------------
Jim Walls - K6CCC
k6ccc@xxxxxxxxx
Mobile Radio Operations
Southern California Edison Co.
Ofc:   626-302-8515   -   PAX   28-515
FAX:   626-302-7501   -   PAX   27-501




**********************************************************
To Unsubscribe, set digest or vacation
mode or view archives use the below link.

http://thethin.net/win2000list.cfm


**********************************************************
To Unsubscribe, set digest or vacation
mode or view archives use the below link.

http://thethin.net/win2000list.cfm

Other related posts:

  • » [windows2000] RES: Re: Office Security Alert