Full Disclosure mailing list archives

Re: DCOM RPC exploit (dcom.c)


From: Paul Schmehl <pauls () utdallas edu>
Date: 27 Jul 2003 18:08:24 -0500

On Sun, 2003-07-27 at 17:06, Knud Erik Højgaard wrote:

Even I, with my limited knowledge, was able to reproduce what seems to have
the same effect using "active registry monitor" and a few minutes of spare
time. However it seems quite a few things use this DCOM stuff, so rolling
out the hotfix via your mass-deployment tool might be the smarter way to go.

We've already patched.  Not that we won't have unpatched machines, mind
you, it's almost impossible not to have exceptions.

-- 
Paul Schmehl (pauls () utdallas edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: