-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi.
This vulnerability was ranked 10.0 (for Windows) in CPUoct2009 and
related to improper AUTH_SESSKEY parameter length validation.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html
Executable + source code attached.
Source code attached.
http://blogs.conus.info
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkrq+Q8ACgkQ1YPmFmJG++PsqACfX4vbv3qcKRUxQDbC2f9F99Qj
rBgAoI0Xc4vzfFe83dKSzIn42E+fDHPC
=Vdv0
-----END PGP SIGNATURE-----