lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4303AAED.60501@science.org> Date: Wed Aug 17 22:23:11 2005 From: jasonc at science.org (Jason Coombs) Subject: Re: It's not that simple... Florian Weimer wrote: > Doesn't the exploit code need a null session? Under Windows 2000 it does, the other OSes require authenticated sessions to launch the exploit. Not clear whether Windows 2000 allows disabling of null sessions, but the implication is not. http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx Regards, Jason Coombs jasonc@...ence.org