- CVE-2010-0806 Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010.
- Microsoft Security Advisory (981374) and fix - kb 981374 Microsoft Security Advisory: Vulnerability in Internet Explorer could allow remote code execution
Here is more more piece of news from the same source as earlier today. Maybe they hope we abandon BBC World News and switch to their agency.
Sent: Sunday, March 28, 2010 11:17 PM
To: XXXXXXXXXXXXXX
Subject: U.S.-ROK ALLIANCE... In Korea, Divide and be Conquered
U.S.-ROK ALLIANCE
In Korea, Divide and be Conquered
Brookings Senior Fellow Michael O'Hanlon argues that, for a number of practical
reasons, 2012 may prove too soon to transfer wartime operational control of
South Korean forces to Korean command. O'Hanlon writes that if there is a
need to evaluate the 2012 plan afresh, that should happen without apology,
without undue haste and without any predetermined conclusion.
Read More
Header info
Received: from [123.125.156.136] by web114509.mail.gq1.yahoo.com via HTTP;
Sun, 28 Mar 2010 20:17:26 PDT
X-Mailer: YahooMailRC/324.3 YahooMailWebService/0.8.100.260964
Date: Sun, 28 Mar 2010 20:17:26 -0700
From: Richard Mark
Subject: U.S.-ROK ALLIANCE... In Korea, Divide and be Conquered
Sender ip info Hostname: 123.125.156.151
ISP: China Unicom Beijing Province Network
Organization: China Unicom Beijing Province Network
Proxy: Suspected network sharing device.
Country: China
State/Region: Beijing
City: Beijing
The exploit and all other details are the same as in this post from earlier today
No comments:
Post a Comment