lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 10 Oct 2003 13:20:48 -0400
From: Adrian_Stone@....com
To: 3APA3A <3APA3A@...URITY.NNOV.RU>
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com,
   NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM, Secure@...rosoft.com
Subject: Re: Bad news on RPC DCOM vulnerability



If I am reading this correctly in the sense is it being stated that with
all patches and hotfixes systems are still vulnerabile to some form of the
RPC exploit as it relates to ms039?

Thanks!

Stone


                                                                                                                                       
                      3APA3A                                                                                                           
                      <3APA3A@...URITY.        To:       bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com,                  
                      NNOV.RU>                  NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM                                                       
                                               cc:       Secure@...rosoft.com                                                          
                      10/10/2003 10:48         Subject:  Bad news on RPC DCOM vulnerability                                            
                      AM                                                                                                               
                      Please respond to                                                                                                
                      3APA3A                                                                                                           
                                                                                                                                       
                                                                                                                                       




Dear bugtraq@...urityfocus.com,

There are few bad news on RPC DCOM vulnerability:

1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
again actual.
2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
with  all  security  fixes  installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists,  but  code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.

Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
Windows XP.

--
http://www.security.nnov.ru
         /\_/\
        { , . }     |\
+--oQQo->{ ^ }<-----+ \
|  ZARAZA  U  3APA3A   }
+-------------o66o--+ /
                    |/
You know my name - look up my number (The Beatles)







_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ