[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <001e01c4c292$5a1a8e00$9c00a8c0@raza0cyz>
From: raza at raza.demon.co.uk (raza)
Subject: New REmote Windows Exploit (MS04-029)
So have we identified the sender of the list and banned him from the
Mailing List.?
Raza
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Vincent
Archer
Sent: 04 November 2004 14:31
To: Ferdinand Klinzer
Cc: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] New REmote Windows Exploit (MS04-029)
On Thu, Nov 04, 2004 at 02:32:33PM +0100, Ferdinand Klinzer wrote:
> It?s a simple perl script...
>
> and i don?t think you can call it an remote exploit?
It's more subtle than you think.
The "exploit" is supposed to try to open a cmd tool on 31337 (eleet) on
a target Windows. It fails; the window system is secure... but
meanwhile,
there's a perl IRC bot running in the background of *your* system.
It's not a remote exploit, it's a trojan targeting the readers of this
list.
--
Vincent ARCHER
varcher@...yall.com
Tel : +33 (0)1 40 07 47 14
Fax : +33 (0)1 40 07 47 27
Deny All - 5, rue Scribe - 75009 Paris - France
www.denyall.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists