[Full-disclosure] Local persistent DoS in Windows XP SP2 Taskmanager
reepex at gmail.com
Fri Mar 14 20:01:07 GMT 2008
While I am sure MS is now trembling at the disclosure of such a high impact
bug, I am wondering why you chose core-security.net as your domain when
core security (.com) is already known as a leading security company with a
On Fri, Mar 14, 2008 at 2:49 PM, SkyOut <skyout at gmx.net> wrote:
> Dear list,
> after weeks of total ignorance by Microsoft I decided to finally release
> all information
> related to a bug, that has to do with the Windows XP SP2 Taskmanager.
> a Registry key makes it possible to disable the Taskmgr. On the next
> startup it will crash with
> an error message. It is possible to backup the key and repair the Registry
> doing so, but
> the attack scenario is clear: A virus uses this code, the user can't open
> the Taskmgr anymore
> and your process is somehow "hidden".
> The full information about this bug, can be found here:
> And the exploit is available here:
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
Full-Disclosure is hosted and sponsored by Secunia.