Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > Microsoft HLINK.DLL Link Memory Corruption Vulnerability

Reply
Thread Tools

Microsoft HLINK.DLL Link Memory Corruption Vulnerability

 
 
imhotep
Guest
Posts: n/a
 
      06-28-2006
"Microsoft HLINK.DLL is prone to a memory-corruption vulnerability. This
issue is due to the library's failure to properly bounds-check
user-supplied input before copying it to an insufficiently sized memory
buffer.

Successfully exploiting this issue allows attackers to execute arbitrary
machine code in the context of applications that use the affected library.
This facilitates the remote compromise of affected computers. Failed
exploit attempts will likely crash targeted applications.

This issue has been shown to be exploitable through Microsoft Excel files.
Other applications using the affected library may also be affected."

http://www.securityfocus.com/bid/18500/discuss

-- Imhotep

--
*************************************
Pass a Net Neutrality Law in the US!!!!

Save the Internet:
http://www.savetheinternet.com/

Its our net:
http://www.itsournet.org/

*************************************
 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Microsoft HLINK.DLL Link Memory Corruption Vulnerability imhotep Computer Security 0 06-23-2006 03:43 AM
Microsoft Excel Unicode Link Memory Corruption Vulnerability imhotep Computer Security 0 06-21-2006 01:58 AM
Microsoft Internet Explorer HTML Tag Memory Corruption Vulnerability Imhotep Computer Security 0 05-27-2006 04:44 AM
Microsoft Windows MSDTC Memory Corruption Vulnerability Imhotep Computer Security 2 12-20-2005 11:32 PM
Microsoft Internet Explorer COM Object Instantiation Memory Corruption Vulnerability Imhotep Computer Security 2 12-15-2005 03:03 PM



Advertisments