[12220] in bugtraq
Re: Weekly release: RDS exploit version 2
daemon@ATHENA.MIT.EDU (.rain.forest.puppy.)
Tue Oct 12 16:31:02 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.LNX.4.10.9910120509560.14608-100000@7of9.neohapsis.com>
Date: Tue, 12 Oct 1999 05:13:41 -0500
Reply-To: ".rain.forest.puppy." <rfp@WIRETRIP.NET>
From: ".rain.forest.puppy." <rfp@WIRETRIP.NET>
X-To: bugtraq@securityfocus.com, maillist@ntsecadvice.com
To: BUGTRAQ@SECURITYFOCUS.COM
There seems to be problems with the detection routine in my script...I
have nothing to blame other than poor coding skills. :)
Anyways, Vittal Aithal makes a good suggestion below.
Cheers,
.rain.forest.puppy.
---------- Forwarded message ----------
Date: Tue, 12 Oct 1999 10:41:39 +0100
From: Vittal Aithal <vittal.aithal@RevolutionLtd.com>
To: '.rain.forest.puppy.' <rfp@WIRETRIP.NET>
Subject: RE: Weekly release: RDS exploit version 2
Hi -
while testing on some internal boxes, i found i had to change
my @s=grep("Server: ",@results);
to
my @s=grep(/^Server:/,@results);
in sub has_msadc(). this tested using perl 5.004_05 on a linux box.
cheers
vittal
--
Vittal Aithal
Revolution Ltd <tel: 020 7549 5800> <fax: 020 7549 5801>
<vittal.aithal@revolutionltd.com> <http://www.revolutionltd.com/>
<vittal.aithal@bigfoot.com> <http://www.bigfoot.com/~vittal.aithal/>