Full Disclosure mailing list archives

Re: DCOM RPC exploit (dcom.c)


From: <dhtml () hush com>
Date: Sat, 26 Jul 2003 19:21:54 -0700


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


From: "Chris Paget" <chrisp () ngssoftware com>

<sarcasm>

I'd just like to thank FlashSky, Benjurry, and H D Moore for releasing
this
code.  Really guys, sterling job.  Now the skript kiddies and VXers
have got
virtually no work to do in order to write a worm that exploits this.

</sarcasm>

Personally, I'm tempted to set up my firewall to NAT incoming requests
on port
135 to either www.metasploit.com or www.xfocus.org.  I know this is
the
full-disclosure list, but working exploit code for an issue this huge
is taking
it a bit far, especially less than 2 weeks after the advisory comes
out.

Cheers, fellas.  When the worm comes out, I'll be thinking of you.

Chris


This shall be taken as the official stance of your employer ngssoftware.com
from whence you post. Otherwise the standard disclaimer would apply.

Or perhaps you are just new there after the spotlight of the "shatter
attack" dimmed down.

-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8jNzIACgkQTAj0ZSCgbx7lWQCgvK1MgnOfrHWI4M2y6Gip5CbhMI8A
oJ33gRJgEcJe4oLFkqYRUfi3n1Wq
=vrfn
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: