lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: lists at macroscape.com (Macroscape Solutions)
Subject: Re: Bad news on RPC DCOM vulnerability

For non-Russian speakers use http://babelfish.altavista.com/

------------------------------
Macroscape Solutions Inc.
information technology foresight
http://www.macroscape.com
------------------------------


-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Brown, Bobby
(US - Hermitage)
Sent: Friday, October 10, 2003 3:34 PM
To: 'Alex'; bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Cc: Secure@...rosoft.com
Subject: RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

For us that can not interpret the site, what more information can be
provided.

Bobby

-----Original Message-----
From: Alex [mailto:pk95@...dex.ru]
Sent: Friday, October 10, 2003 1:09 PM
To: bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Cc: Secure@...rosoft.com
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


Exploit code can be found here:
http://www.securitylab.ru/40754.html

This code work with  all  security  fixes. It's very dangerous.

----- Original Message ----- 
From: "3APA3A" <3APA3A@...URITY.NNOV.RU>
To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
<NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
Cc: <Secure@...rosoft.com>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability


> Dear bugtraq@...urityfocus.com,
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> again actual.
> 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> with  all  security  fixes  installed still vulnerable to variant of the
> same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> exists,  but  code execution is probably possible. Technical details are
> sent to Microsoft, waiting for confirmation.
>
> Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> Windows XP.
>
> -- 
> http://www.security.nnov.ru
>          /\_/\
>         { , . }     |\
> +--oQQo->{ ^ }<-----+ \
> |  ZARAZA  U  3APA3A   }
> +-------------o66o--+ /
>                     |/
> You know my name - look up my number (The Beatles)
>
>
>


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and is protected by law.  If
you are not the intended recipient, you should delete this message.  Any
disclosure, copying, or distribution of this message, or the taking of any
action based on it, is strictly prohibited.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 ** CRM114 Whitelisted by: securityfocus.com **
 
 ** ACCEPT: CRM114 Whitelisted by: securityfocus.com **
 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ