[32041] in bugtraq

home help back first fref pref prev next nref lref last post

Bad news on RPC DCOM vulnerability

daemon@ATHENA.MIT.EDU (3APA3A)
Fri Oct 10 11:37:06 2003

Date: Fri, 10 Oct 2003 18:48:52 +0400
From: 3APA3A <3APA3A@SECURITY.NNOV.RU>
Reply-To: 3APA3A <3APA3A@SECURITY.NNOV.RU>
Message-ID: <1155962754.20031010184852@SECURITY.NNOV.RU>
To: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com,
        NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Cc: Secure@microsoft.com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Dear bugtraq@securityfocus.com,

There are few bad news on RPC DCOM vulnerability:

1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
again actual.
2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
with  all  security  fixes  installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists,  but  code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.

Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
Windows XP.

-- 
http://www.security.nnov.ru
         /\_/\
        { , . }     |\
+--oQQo->{ ^ }<-----+ \
|  ZARAZA  U  3APA3A   }
+-------------o66o--+ /
                    |/
You know my name - look up my number (The Beatles)


home help back first fref pref prev next nref lref last post