On Mon, 2 Apr 2007, James (njan) Eaton-Lee wrote: > Gadi, > > Gadi Evron wrote: > > >> I'm thinking that an attacker with write access to %systemroot% probably > >> has juicier, simpler targets to attack (which potentially let them run > >> code in a higher security context) than animated cursors. > > > > http://www.milw0rm.com/exploits/3636 > > I'm struggling to see what direct relevance this has to what I just said...
It has relevance to what you replied to. > > - James. > > -- > James (njan) Eaton-Lee | UIN: 10807960 | http://www.jeremiad.org > > "All at sea again / And now my hurricanes > Have brought down this ocean rain / To bathe me again" > > https://www.bsrf.org.uk | ca: https://www.cacert.org/index.php?id=3 > -- > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
