Try running a BinDiff and seeing what was changed. On Sat, Oct 25, 2008 at 10:50 PM, rholgstad <[EMAIL PROTECTED]> wrote:
> does securiteam do anything technical or just summarize crap from all > over the web? > > also nice generic language about 'code execution', seeing how no one on > your team can exploit or research it themselves > > Juha-Matti Laurio wrote: > > I have posted Frequently Asked Questions document about the Windows RPC, > i.e. Server service vulnerability MS08-067. > > > > The document entitled as Microsoft Windows RPC Vulnerability MS08-067 > (CVE-2008-4250) FAQ - October 2008 can be found at > > http://blogs.securiteam.com/index.php/archives/1150 > > > > The document describes Trojans related to this issue too. > > > > Juha-Matti > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > > > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- http://www.goldwatches.com/ http://www.jewelerslounge.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
