Microsoft Security Advisory (2488013): Vulnerability in Internet Explorer Could Allow Remote Code Ex


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (2488013): Vulnerability in Internet Explorer Could Allow Remote Code Ex
# 1  
Old 02-08-2011
Microsoft Security Advisory (2488013): Vulnerability in Internet Explorer Could Allow Remote Code Ex

Revision Note: V2.0 (February 8, 2011): Advisory updated to reflect publication of security bulletin. Advisory Summary:Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS11-003 to address this issue. For more information about this issue, including download links for an available security update, please review MS11-003. The vulnerability addressed is the CSS Memory Corruption Vulnerability - CVE-2010-3971.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
auth-relaytest(1)					      General Commands Manual						 auth-relaytest(1)

NAME
auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host SYNOPSIS
auth-relaytest [-tv] ntlm <ip address[:port]> auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]> DESCRIPTION
auth-relaytest attempts to connect to the specified <ip address> on the specified port (default is port 25) and tries to use the supplied authentication data to relay mail through the host. auth-relaytest uses the sender_user, sender_domain, target_user, target_domain, and auth-message parameters from dsbl.conf(5) by default. If the auth-message parameter is not present, the message parameter is used instead. In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in cer- tain Microsoft SMTP server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relay- ing for any client that authenticates in this way. In the second form of operation, auth-relaytest attempts to authenticate using either the cram-md5 or login variant of SMTP AUTH, using the supplied username and password. OPTIONS
-t Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the test_target_domain parameter is used instead. This is useful for sending a test message to yourself, perhaps to check that the server is actually relaying the messages. -v Verbose mode. Details of the SMTP transaction are written to standard output. AUTHORS
Paul Howarth <paul@city-fan.org> Ian Gulliver <ian@penguinhosting.net> SEE ALSO
dsbl.conf(5), spamtrap(1), relaytest(1) 2004-01-06 auth-relaytest(1)