Juha-Matti Laurio wrote:
> Related to the newest MS Word 0-day
> http://blogs.technet.com/msrc/archive/2006/12/10/new-report-of-a-word-zero-day.aspx
> 
> US-CERT Vulnerability Note VU#166700 released today lists the following
> new technical detail:
> 
> "Microsoft Word fails to properly handle malformed data structures
> allowing memory corruption to occur."
> http://www.kb.cert.org/vuls/id/166700

I appreciate your efforts to keep the community informed, but these kinds of
"technical details" are completely useless. It's not your fault, this has been a
long-standing problem with the information from coming from the likes of CERT
and MSRC.

Almost all Office vulnerabilities (and security issues in file parsers in
general) are a result of "malfromed data structures allowing memory corruption
to occur". Repeating this statement for every Word bug doesn't tell us anything 
new.

Descriptions of vulnerabilities, especially ones that are found in the wild,
should include enough information to allow researchers to uniquely identify the
new vulnerability and differentiate it from all other bugs, both known ones and
0days. Without that level of detail, you end up with this:
http://www.securityfocus.com/archive/1/443288


Alex

Reply via email to