[Full-disclosure] Microsoft's Binary Planting Clean-Up Mission




Our new blog post describes some recent changes Microsoft introduced to fight against
binary planting exploits. The most recent change was the removal of a vulnerable COM
server on Windows XP which we used in our proof of concept at Hack In The Box
Amsterdam in May.

Read the post to find out what else is hiding in the "COM server binary planting"
closet and what to do to get our PoC back to life.

http://blog.acrossecurity.com/2011/09/microsofts-binary-planting-clean-up.html

or

http://bit.ly/qWyKph

Enjoy the reading!


Mitja Kolsek
CEO&CTO

ACROS, d.o.o.
Makedonska ulica 113
SI - 2000 Maribor, Slovenia
tel: +386 2 3000 280
fax: +386 2 3000 282
web: http://www.acrossecurity.com
blg: http://blog.acrossecurity.com

ACROS Security: Finding Your Digital Vulnerabilities Before Others Do


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/