[<prev] [next>] [day] [month] [year] [list]
From: dlimanov at sct.com (Dimitri Limanovski)
Subject: Re: Bad news on RPC DCOM vulnerability
Not much info on the page but here goes the juicy part.
Exploit: http://www.securitylab.ru/_exploits/rpc2.c.txt
Shellcode: http://www.securitylab.ru/_exploits/shell.asm.txt
Based on user responses, this is, in fact, working exploit that will
work on already patched systems. It's only a matter of time for
compiled binary to surface.
Dimitri
|---------+-------------------------------------->
| | "Brown, Bobby (US - |
| | Hermitage)" |
| | <bobbrown@...oitte.com> |
| | Sent by: |
| | full-disclosure-admin@...ts|
| | .netsys.com |
| | |
| | |
| | 10/10/2003 03:34 PM |
| | |
|---------+-------------------------------------->
>--------------------------------------------------------------------------------------------------------------|
| |
| To: "'Alex'" <pk95@...dex.ru>, bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com, |
| NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM |
| cc: Secure@...rosoft.com |
| Subject: RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability |
>--------------------------------------------------------------------------------------------------------------|
For us that can not interpret the site, what more information can be
provided.
Bobby
-----Original Message-----
From: Alex [mailto:pk95@...dex.ru]
Sent: Friday, October 10, 2003 1:09 PM
To: bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Cc: Secure@...rosoft.com
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
Exploit code can be found here:
http://www.securitylab.ru/40754.html
This code work with all security fixes. It's very dangerous.
----- Original Message -----
From: "3APA3A" <3APA3A@...URITY.NNOV.RU>
To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
<NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
Cc: <Secure@...rosoft.com>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability
> Dear bugtraq@...urityfocus.com,
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1. Universal exploit for MS03-039 exists in-the-wild, PINK
FLOYD is
> again actual.
> 2. It was reported by exploit author (and confirmed), Windows XP
SP1
> with all security fixes installed still vulnerable to variant of
the
> same bug. Windows 2000/2003 was not tested. For a while only DoS
exploit
> exists, but code execution is probably possible. Technical details
are
> sent to Microsoft, waiting for confirmation.
>
> Dear ISPs. Please instruct you customers to use personal
fireWALL in
> Windows XP.
>
> --
> http://www.security.nnov.ru
> /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-----+ \
> | ZARAZA U 3APA3A }
> +-------------o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential
information
intended for a specific individual and purpose, and is protected by
law. If
you are not the intended recipient, you should delete this message.
Any
disclosure, copying, or distribution of this message, or the taking of
any
action based on it, is strictly prohibited.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists