Stop Microsoft

All Things Microsoft => Microsoft as a Company => Topic started by: M51DPS on 15 September 2004, 06:51

Title: JPEG Vulnerability
Post by: M51DPS on 15 September 2004, 06:51
Before you start bashing microsoft, try not to forget about the recent PNG vulnerability....

 
quote:
As reported by numerous sources (http://news.google.com/?hl=en&ncl=http://www.mercurynews.com/mld/mercurynews/business/9662784.htm), a new vulnerability has been disclosed (and patched) by Microsoft. This one concerns the parsing of JPEGs in XP Microsoft applications. A buffer overflow can be used to execute arbitrary code. So all those times you told your parents/friends that looking at images was safe - well, not anymore.

Article (http://it.slashdot.org/it/04/09/14/2226226.shtml?tid=172&tid=128&tid=201&tid=218)
Title: JPEG Vulnerability
Post by: Stilly on 15 September 2004, 21:44
but it says its been patched
Title: JPEG Vulnerability
Post by: worker201 on 15 September 2004, 11:17
Call me when there's a tiff or eps vulnerability.
  :D
Title: JPEG Vulnerability
Post by: WMD on 16 September 2004, 00:01
quote:
Before you start bashing microsoft, try not to forget about the recent PNG vulnerability....

But was that in the format, or the parser?  I can't remember, was it in libpng?
Title: JPEG Vulnerability
Post by: Refalm on 16 September 2004, 01:35
First mp3 played by Winamp contained virusses, then Trillian skins, right after PNG's and now JPG's.

When does the non-executable file format virusses stop?