[63909] in North American Network Operators' Group
next blaster coming up?
daemon@ATHENA.MIT.EDU (Tomas Daniska)
Mon Oct 13 04:20:59 2003
Date: Mon, 13 Oct 2003 10:20:28 +0200
From: "Tomas Daniska" <tomas@tronet.com>
To: <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu
maybe not 100% acknowledged, but still good to know
From: 3APA3A <3APA3A_@_security.nnov.ru> =20
Date: 11 =CF=CB=D4=D1=C2=D2=D1 2003 =C7.=20
Subject: Bad news on RPC DCOM vulnerability=20
-------------------------------------------------------------------------=
-------
Dear bugtraq@securityfocus.com,
There are few bad news on RPC DCOM vulnerability:
1. Universal exploit for MS03-039 exists in-the-wild, PINK FLOYD is
again actual.
2. It was reported by exploit author (and confirmed), Windows XP SP1
with all security fixes installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists, but code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.
Dear ISPs. Please instruct you customers to use personal fireWALL in
Windows XP.
http://www.security.nnov.ru
--
=20
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
=20
A transistor protected by a fast-acting fuse will protect the fuse by =
blowing first.