[36167] in bugtraq
Re: First vulnerabilities in the SP2 - XP ?...
daemon@ATHENA.MIT.EDU (Radoslav =?utf-8?q?Dejanovi=C4=87?)
Thu Aug 19 00:50:05 2004
From: Radoslav =?utf-8?q?Dejanovi=C4=87?= <radoslav.dejanovic@opsus.hr>
To: bugtraq@securityfocus.com
Date: Wed, 18 Aug 2004 09:41:16 +0200
In-Reply-To: <20040816135814.18677.qmail@www.securityfocus.com>
MIME-Version: 1.0
Content-Disposition: inline
Content-Type: text/plain;
charset="utf-8"
Message-Id: <200408180941.16239.radoslav.dejanovic@opsus.hr>
Content-Transfer-Encoding: 8bit
On Monday 16 August 2004 15:58, Jérôme ATHIAS wrote:
> http://www.heise.de/security/artikel/50051
This basically tells the user to open CMD and then execute the attachment
in command line. Now, someone has to be really, really dumb to do that.
The good point here is that people don't know what CMD is and might be
reluctant to do something they do not understand. I wouldn't say this is
SP2 vulnerability, it might just be that noone tought about such an
exploit. However, I think it doesn't have to do with Microsoft, but with
less than average IQ of some users. There's no company, not Microsoft, not
IBM, not Linux nor BSD, that can make a 100% foolproof system.
This might be SP2 bug only if the same bug can't be repeated on pre-SP2
machine. Didn't test, but I think this is an old trick. Anyone care to
test it?
--
Radoslav Dejanović
Operacijski sustavi d.o.o.
http://www.opsus.hr