[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA27171405@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: MS04-028 Shell Exploit
MS04-028 Exploit
Launches local cmd.exe (not port bound)
http://www.k-otik.com/exploits/09222004.ms04-28-cmd.c.php
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Josh L.
Perrymon
Sent: Wednesday, September 22, 2004 1:48 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] New GDI exploit
Game over...
So the exploit is out that will open a local command prompt on the
machine exploiting the GDI library..
This thing allows 2500 bytes of shellcode..
How long before this turns nasty?
Seems easy to me to make it reverse shell...
--------
The problem I have is patching with SMS. MBSA won't pickup the needed
patched in SMS so you have to push out to all machines in a container
for a certain software type-
IE
XP
VIsio
blah blah so on....
------------
The cycle continues..
JP
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists