[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200307270221.h6R2LsTt068374@mailserver3.hushmail.com>
From: dhtml at hush.com (dhtml@...h.com)
Subject: DCOM RPC exploit (dcom.c)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
From: "Chris Paget" <chrisp@...software.com>
>
> <sarcasm>
>
> I'd just like to thank FlashSky, Benjurry, and H D Moore for releasing
this
> code. Really guys, sterling job. Now the skript kiddies and VXers
have got
> virtually no work to do in order to write a worm that exploits this.
>
> </sarcasm>
>
> Personally, I'm tempted to set up my firewall to NAT incoming requests
on port
> 135 to either www.metasploit.com or www.xfocus.org. I know this is
the
> full-disclosure list, but working exploit code for an issue this huge
is taking
> it a bit far, especially less than 2 weeks after the advisory comes
out.
>
> Cheers, fellas. When the worm comes out, I'll be thinking of you.
>
> Chris
This shall be taken as the official stance of your employer ngssoftware.com
from whence you post. Otherwise the standard disclaimer would apply.
Or perhaps you are just new there after the spotlight of the "shatter
attack" dimmed down.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3
wkYEARECAAYFAj8jNzIACgkQTAj0ZSCgbx7lWQCgvK1MgnOfrHWI4M2y6Gip5CbhMI8A
oJ33gRJgEcJe4oLFkqYRUfi3n1Wq
=vrfn
-----END PGP SIGNATURE-----
Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434
Promote security and make money with the Hushmail Affiliate Program:
https://www.hushmail.com/about.php?subloc=affiliate&l=427
Powered by blists - more mailing lists