Full Disclosure mailing list archives

Re: DCOM RPC exploit (dcom.c)


From: manohar singh <seclistaddress () yahoo com>
Date: Sun, 27 Jul 2003 17:15:44 -0700 (PDT)

Well,

So far about a 100 emails on this subject (dcom.c),
and  all this is doing is irritate everybody.

Guys, this IS an unmoderated list, and people WILL
post exploits. Clear and simple. Let's just grow up,
and get back to work instead of cribbing in public
forums.

ms




--- Valdis.Kletnieks () vt edu wrote:
On Sat, 26 Jul 2003 22:29:56 CDT, Ron DuFresne said:
I'm just trying to understand how corporate
networks would/should be at
risk with this, why port 135 would not be filtered
already limiting
exposure.  Is there a reason why it would not be
that I'm missing?  The

It's the rare corporate net indeed that doesn't have
a single remotely
exploitable copy of IE or Outlook left in its entire
address space.

And Slammer proved quite well that having a firewall
doesn't stop squat.


ATTACHMENT part 2 application/pgp-signature 



__________________________________
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: