lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: elvar at ooz.net (Elvar)
Subject: whoch DCOM exploit code are they speaking about here?

I realize it's probably just my lack of skills, but this doesn't seem to
compile unmodified. I do not know any C / CPP so I can't figure out what to
fix to make it compile if it does indeed need modification.


Elvar

-lick your wounds



-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of SPAM
Sent: Tuesday, September 16, 2003 10:09 PM
To: full-disclosure@...sys.com
Subject: Fw: [Full-Disclosure] whoch DCOM exploit code are they speaking
about here?

I think this would be the one...

http://packetstormsecurity.nl/0309-exploits/09.16.MS03-039-exp.c

Ed

----- Original Message ----- 
From: "Josh Karp" <jkarp@...ionael.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Wednesday, September 17, 2003 7:19 AM
Subject: [Full-Disclosure] whoch DCOM exploit code are they speaking about
here?


>
http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2003/09/16/nati
> onal1842EDT0790.DTL
>
<http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2003/09/16/nat
> ional1842EDT0790.DTL>
>
> Security researchers on Tuesday detected hackers distributing software to
> break into computers using flaws announced last week in some versions of
> Microsoft Corp.'s Windows operating system.
> The threat from this new vulnerability -- which already has drawn stern
> warnings from the Homeland Security Department -- is remarkably similar to
> one that allowed the Blaster virus to infect hundreds of thousands of
> computers last month.
> The discovery gives fresh impetus for tens of millions of Windows users --
> inside corporations and in their homes -- to immediately apply a free
> repairing patch from Microsoft. Homeland Security officials have warned
that
> attacks could result in a "significant impact" on the operation of the
> Internet.
> Researchers from iDefense Inc. of Reston, Va., who found the new attack
> software being distributed from a Chinese Web site, said it was already
> being used to break into vulnerable computers and implant eavesdropping
> programs. They said they expect widespread attacks similar to the Blaster
> infection within days.
> "It's fairly likely," said Ken Dunham, a senior iDefense analyst.
"Certainly
> we'll see new variants in the next few hours or days."
> Microsoft confirmed it was studying the new attack tool.
> Last month's Blaster infection spread just days after hackers began
> distributing tools for breaking into Windows computers using a related
> software flaw. That infection disrupted computers at the Federal Reserve
in
> Atlanta, Maryland's motor vehicle agency and the Minnesota transportation
> department.
> The latest Windows flaws, announced Sept. 10, were nearly identical to
those
> exploited by the Blaster worm. Computer users who applied an earlier patch
> in July to protect themselves still must install the new patch from
> Microsoft, available from its Web site.
> Amy Carroll, a director in Microsoft's security business unit, said 63
> percent more people have already downloaded the latest patch than
downloaded
> the patch for last month's similar vulnerability during the same five-day
> period.
> "We've continued to beat the drum, to give people better awareness,"
Carroll
> said. "We have seen some success."
> The latest hacker tool was relatively polished. It gives hackers access to
> victims' computers by creating a new account with the name "e" with a
preset
> password. iDefense said the tool includes options to attack two Windows
2000
> versions that are commonly used inside corporations.
> The tool being distributed Tuesday did not include an option to break into
> computers running Microsoft's latest operating systems, such as Windows XP
> or Windows Server 2003, but iDefense said it expected such modifications
to
> make it more dangerous.
>
> On the Net:
> Microsoft warning:
> www.microsoft.com/security/security_bulletins/ms03-039.asp
> <http://www.microsoft.com/security/security_bulletins/ms03-039.asp>
> Homeland Security warning:
> www.nipc.gov/warnings/advisories/2003/Advisory9102003.htm
> <http://www.nipc.gov/warnings/advisories/2003/Advisory9102003.htm>
>
>
>
>


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ