[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
- To: 3APA3A <3APA3A@SECURITY.NNOV.RU>
- Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
- From: Adrian_Stone@fpl.com
- Date: Fri, 10 Oct 2003 13:20:48 -0400
If I am reading this correctly in the sense is it being stated that with
all patches and hotfixes systems are still vulnerabile to some form of the
RPC exploit as it relates to ms039?
Thanks!
Stone
3APA3A
<3APA3A@SECURITY. To:
bugtraq@securityfocus.com, full-disclosure@lists.netsys.com,
NNOV.RU>
NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
cc: Secure@microsoft.com
10/10/2003 10:48 Subject: Bad news on RPC DCOM
vulnerability
AM
Please respond to
3APA3A
Dear bugtraq@securityfocus.com,
There are few bad news on RPC DCOM vulnerability:
1. Universal exploit for MS03-039 exists in-the-wild, PINK FLOYD is
again actual.
2. It was reported by exploit author (and confirmed), Windows XP SP1
with all security fixes installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists, but code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.
Dear ISPs. Please instruct you customers to use personal fireWALL in
Windows XP.
--
http://www.security.nnov.ru
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A }
+-------------o66o--+ /
|/
You know my name - look up my number (The Beatles)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html