[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <000d01c352b9$97d74200$0202a8c0@teliahomebase>
From: kruse at krusesecurity.dk (Peter Kruse)
Subject: SV: The French BUGTRAQ
Hi,
>From the code:
RPC DCOM overflow Vulnerability discoveried by LSD
Code by FlashSky,Flashsky xfocus org,benjurry,benjurry xfocus org
It sure looks like it ... Better patch up.
Med venlig hilsen // Kind regards
Peter Kruse
Kruse Security
http://www.krusesecurity.dk
-----Oprindelig meddelelse-----
Fra: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] P? vegne af D C
Sendt: 25. juli 2003 15:31
Til: full-disclosure@...ts.netsys.com
Emne: Re: [Full-Disclosure] The French BUGTRAQ
I noticed there is a an exploit in the archive at http://www.K-otiK.com
titled "MS Windows RPC DCOM Interface Buffer Overflow Exploit" (the file
itself is 07.21.MS03-026.c). I have not had a chance to review the code
closely, yet... is this an exploit based on the Windows RPC advisory
released by The Last Stage of Delirium recently?
Do you Yahoo!?
The New Yahoo! Search - Faster. Easier. Bingo.
Powered by blists - more mailing lists