lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <013001c3603b$a4291a80$0100a8c0@newmarkr>
From: harqman at btopenworld.com (harq deman)
Subject: Cox is blocking port 135 - off topic

MS realise that they are about to be firewalled by every ISP that cares
about its client base, and are now stating that you shouldn't have been
using their product on a public network in the first place.  I don't
remember hearing this before, though, and if they knew this why isn't ICF
enabled as default as part of their internet connection wizardry?

Hindsight is always 20/20.
--harq
----- Original Message ----- 
From: "Joey" <joey2cool@...oo.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Monday, August 11, 2003 7:31 PM
Subject: Re: [Full-Disclosure] Cox is blocking port 135 - off topic


> Microsoft says - "To exploit this vulnerability, the
> attacker must be able to send a specially crafted
> request to port 135, port 139, port 445, or any other
> specifically configured RPC port on the remote
> computer. For intranet environments, these ports are
> typically accessible, but for Internet-connected
> computers, these ports are typically blocked by a
> firewall."
>
> But since those are different services(SMB, DCOM,
> Netbios), wouldnt you need to send an entirely
> different packet? it sounds impossible to use the same
> exploit on multple protocols.
>
> Port 80 is not an attack vector -
> "RPC over UDP or TCP is not intended to be used in
> hostile environments, such as the Internet. More
> robust protocols, such as RPC over HTTP, are provided
> for hostile environments."
> http://support.microsoft.com/?kbid=823980
>
> Microsoft is saying RPC over UDP or TCP shouldnt be
> used on the internet and you need a firewall to block
> the ports anyway. I guess they aren't keeping their
> new promise for security seriously.
>
> --- roman.kunz@...iusbaer.com wrote:
> > hi list,
> >
> > i tried all different DCOM RPC sploit's i could find
> > (from the very
> > beginning till the newest versions).
> > i couldn't find any succesfully working on other
> > ports then 135.
>
> __________________________________
> Do you Yahoo!?
> Yahoo! SiteBuilder - Free, easy-to-use web site design software
> http://sitebuilder.yahoo.com
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ