[<prev] [next>] [day] [month] [year] [list]
From: Adrian_Stone at fpl.com (Adrian_Stone@....com)
Subject: Re: Bad news on RPC DCOM vulnerability
If I am reading this correctly in the sense is it being stated that with
all patches and hotfixes systems are still vulnerabile to some form of the
RPC exploit as it relates to ms039?
Thanks!
Stone
3APA3A
<3APA3A@...URITY. To: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com,
NNOV.RU> NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
cc: Secure@...rosoft.com
10/10/2003 10:48 Subject: Bad news on RPC DCOM vulnerability
AM
Please respond to
3APA3A
Dear bugtraq@...urityfocus.com,
There are few bad news on RPC DCOM vulnerability:
1. Universal exploit for MS03-039 exists in-the-wild, PINK FLOYD is
again actual.
2. It was reported by exploit author (and confirmed), Windows XP SP1
with all security fixes installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists, but code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.
Dear ISPs. Please instruct you customers to use personal fireWALL in
Windows XP.
--
http://www.security.nnov.ru
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A }
+-------------o66o--+ /
|/
You know my name - look up my number (The Beatles)
Powered by blists - more mailing lists