Full Disclosure mailing list archives

Re: DCOM RPC exploit (dcom.c)


From: "CHeeKY" <cheekypeople () sec33 com>
Date: Mon, 28 Jul 2003 06:05:16 +0100

if you use the hack and tell it the wronf opsys then you get DOS basically
against your machine, I have used this in the wild and at home and its
works
far too well.

patch up and lockdown folks.


-------------------------------------------------------------------------
FIGHT BACK AGAINST SPAM!
Download Spam Inspector, the Award Winning Anti-Spam Filter
http://mail.giantcompany.com


----- Original Message ----- 
From: "El Guille" <guille7 () montevideo com uy>
To: <full-disclosure () lists netsys com>
Sent: Sunday, July 27, 2003 9:14 PM
Subject: Re: [Full-disclosure] DCOM RPC exploit (dcom.c)




I have tested it against Windows XP (German edition) without Service
Pack.
It just causes the NT authority to shutdown and the Computer needs a
reboot.
regards,

need to change ret. address I guess. Tested in W2K SP4 (spanish), ret
address use 0x77A53B13, works fine

saluT

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html





_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: