[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <008901c38f74$19128bd0$6801a8c0@msi.intra.macroscape.com>
Date: Fri, 10 Oct 2003 17:18:48 -0400
From: "Macroscape Solutions" <lists@...roscape.com>
To: "'Brown, Bobby (US - Hermitage)'" <bobbrown@...oitte.com>,
"'Alex'" <pk95@...dex.ru>, <bugtraq@...urityfocus.com>,
<full-disclosure@...ts.netsys.com>
Subject: RE: Re: Bad news on RPC DCOM vulnerability
For non-Russian speakers use http://babelfish.altavista.com/
------------------------------
Macroscape Solutions Inc.
information technology foresight
http://www.macroscape.com
------------------------------
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Brown, Bobby
(US - Hermitage)
Sent: Friday, October 10, 2003 3:34 PM
To: 'Alex'; bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Cc: Secure@...rosoft.com
Subject: RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
For us that can not interpret the site, what more information can be
provided.
Bobby
-----Original Message-----
From: Alex [mailto:pk95@...dex.ru]
Sent: Friday, October 10, 2003 1:09 PM
To: bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Cc: Secure@...rosoft.com
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
Exploit code can be found here:
http://www.securitylab.ru/40754.html
This code work with all security fixes. It's very dangerous.
----- Original Message -----
From: "3APA3A" <3APA3A@...URITY.NNOV.RU>
To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
<NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
Cc: <Secure@...rosoft.com>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability
> Dear bugtraq@...urityfocus.com,
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1. Universal exploit for MS03-039 exists in-the-wild, PINK FLOYD is
> again actual.
> 2. It was reported by exploit author (and confirmed), Windows XP SP1
> with all security fixes installed still vulnerable to variant of the
> same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> exists, but code execution is probably possible. Technical details are
> sent to Microsoft, waiting for confirmation.
>
> Dear ISPs. Please instruct you customers to use personal fireWALL in
> Windows XP.
>
> --
> http://www.security.nnov.ru
> /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-----+ \
> | ZARAZA U 3APA3A }
> +-------------o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and is protected by law. If
you are not the intended recipient, you should delete this message. Any
disclosure, copying, or distribution of this message, or the taking of any
action based on it, is strictly prohibited.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
** CRM114 Whitelisted by: securityfocus.com **
** ACCEPT: CRM114 Whitelisted by: securityfocus.com **
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists