lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: James.Cupps at sappi.com (James.Cupps@...pi.com)
Subject: Windows Lsasrv.dll RPC buffer overflow Remo
	te Exploit (MS04-011)

Did anybody else notice that the SecurityFocus site had the LSASS code you
mentioned below posted for a few days and now it is gone? Did they change
the name of the post under the vulnerability section or just remove it? If
they removed it then it makes me wonder why. 

 

James Cupps
Information Security Officer



-----Original Message-----
From: - ElviS - [mailto:elvi52001@...oo.com] 
Sent: Tuesday, April 27, 2004 2:06 AM
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] Windows Lsasrv.dll RPC buffer overflow Remote
Exploit (MS04-011)

 

 <http://isc.sans.org/diary.php?date=2004-04-26>  

http://www.k-otik.com/exploits/04252004.ms04011lsass.c.php
<http://www.k-otik.com/exploits/04252004.ms04011lsass.c.php> 

http://isc.sans.org/diary.php?date=2004-04-26
<http://isc.sans.org/diary.php?date=2004-04-26> 

 

Handler's Diary April 26th 2004 " An exploit targeting the recently released
vulnerability in Windows' Active Directory service functions in LSASRV.DLL
(LSASS: Local Security Authority Subsystem Service) was made public today. 

The exploit is effective against some versions of Windows 2000 with SP3 or
SP4 installed. The patch released earlier this month as part of MS04-011
will fix this vulnerability. 

If you have not done so already, please apply the MS04-011 patch as soon as
possible. Even if no worm is released, we expect that all Internet facing
systems will be probed with this exploit over the next couple of days. 

The exploit will allow full remote control via a remote shell. The port used
by the remote shell can be changed via a command line option. we just
received a report of the exploit being used in the wild. "

really dangerous !



Paul Tinsley <jackhammer@...il.com <mailto:jackhammer@...il.com%3e> > wrote:

I haven't seen much discussion about this one other than here:
http://www.incidents.org/diary.php?date=2004-04-25&isc=24f2410ad7a5b786b009d
9226c908b92
and I just figured I would pass along that this one is real and does
work. We setup some vmware sessions awhile ago and tested it against
a W2K SP4 box with no success, but a W2K SP4 box with all patches
except MS04-011 and MS04-012 was a successful target. So patching is
probably a good idea if you haven't already done so.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

   _____  

Do you Yahoo!?
Win
<http://pa.yahoo.com/*http:/us.rd.yahoo.com/hotjobs/hotjobs_mail_signature_f
ooter_textlink/evt=23983/*http:/hotjobs.sweepstakes.yahoo.com/careermakeover
>  a $20,000 Career Makeover at Yahoo! HotJobs 

This message may contain information which is private, privileged or
confidential and is intended solely for the use of the individual or entity
named in the message. If you are not the intended recipient of this message,
please notify the sender thereof and destroy / delete the message. Neither
the sender nor Sappi Limited (including its subsidiaries and associated
companies) shall incur any liability resulting directly or indirectly from
accessing any of the attached files which may contain a virus or the like. 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040427/02027069/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ