lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 16 Mar 2012 14:13:36 -0400
From: Thomas Richards <g13net@...il.com>
To: Ian Hayes <cthulhucalling@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: ms12-020 PoC
The original researcher has released his advisory:
http://www.exploit-db.com/exploits/18606/
On Fri, Mar 16, 2012 at 2:06 PM, Ian Hayes <cthulhucalling@...il.com> wrote:
> On Fri, Mar 16, 2012 at 10:50 AM, Exibar <exibar@...lair.com> wrote:
> > Is that the same code from yesterday? I thought that code was a fake
> and didn'kt do anything?
> >
> > Anyone confirm this?
> >
> > Exibar
> > Sent via BlackBerry by AT&T
>
> I haven't run this one, but there is a Ruby script on at
> binaryninjas.org that has taken out every testbed Windows box that I
> have thrown at it.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists