[63909] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

next blaster coming up?

daemon@ATHENA.MIT.EDU (Tomas Daniska)
Mon Oct 13 04:20:59 2003

Date: Mon, 13 Oct 2003 10:20:28 +0200
From: "Tomas Daniska" <tomas@tronet.com>
To: <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu



maybe not 100% acknowledged, but still good to know




From: 3APA3A <3APA3A_@_security.nnov.ru> =20
Date: 11 =CF=CB=D4=D1=C2=D2=D1 2003 =C7.=20
Subject: Bad news on RPC DCOM vulnerability=20

-------------------------------------------------------------------------=
-------

Dear bugtraq@securityfocus.com,

There are few bad news on RPC DCOM vulnerability:

1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
again actual.
2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
with  all  security  fixes  installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists,  but  code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.

Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
Windows XP.

http://www.security.nnov.ru




--
=20
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
=20
A transistor protected by a fast-acting fuse will protect the fuse by =
blowing first.


home help back first fref pref prev next nref lref last post