lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <38200.207.44.164.74.1063760691.squirrel@redrazor.net> From: pdt at jackhammer.org (pdt@...khammer.org) Subject: EXPLOIT : RPC DCOM (MS03-039) Has anyone tested this exploit successfully? I havn't been able to make it work as of yet. I tried the Target 0 type and have the exact DLL versions referenced. Just wondering if this is BS or there is some other dependency on my test systems that isn't quite lining up. Reguardless I think I am going to throw a sleeping bag in the back of the car on the way to work tomorrow, I think there are some long days coming up soon. >RPC DCOM long filename heap overflow Exploit (MS03-039) > >http://www.k-otik.com/exploits/09.16.MS03-039-exp.c.php > >blaster.b soon ?