lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <093601c38e70$df843250$0100a8c0@kick> From: kilian.cavalotti at crans.org (Kilian CAVALOTTI) Subject: MS RPC remote exploit. Sudharsha Wijesinghe wrote: > According to MS there cant be any Remote exploit on MS RPC except for > a DOS attack using 139/135/445. > How ever the code is available for a shell code. > has any one tried this exploit? Seems not to be compilable "out of the box". -- Kilian CAVALOTTI | GPGKeyId: 0xD657340C BOFH excuse #69: knot in cables caused data stream to become twisted and kinked