Full Disclosure mailing list archives
Re: New REmote Windows Exploit (MS04-029)
From: Valdis.Kletnieks () vt edu
Date: Thu, 04 Nov 2004 14:29:14 -0500
On Thu, 04 Nov 2004 11:07:47 EST, Michael Riedel said:
Ok so I was dumb enough to run it. Anyone else catch what commands they run/ know of a way to track. I really don't feel like re-compiling gentoo.
Multiple people have posted what Perl code gets executed. The problem is this: $_ = `$_`; That just runs as a command whatever the remote attacker asked you to. Unless you had a tcpdump of all the traffic, you have no idea. Moral of the story: Always test unknown binaries on a sacrificial machine you're willing to rebuild, and always log the network traffic. ;) In the meantime, unless you have a Tripwire of your binaries *and* your source tree, I'd suggest re-downloading and recompiling, and hoping that your compiler hasn't had a Ken Thompson Special installed in it. ;)
Attachment:
_bin
Description:
Current thread:
- RE: New REmote Windows Exploit (MS04-029), (continued)
- RE: New REmote Windows Exploit (MS04-029) Rich Parsons (Nov 03)
- RE: New REmote Windows Exploit (MS04-029) raza (Nov 03)
- Re: New REmote Windows Exploit (MS04-029) DanB UK (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Ferdinand Klinzer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Vincent Archer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Ferdinand Klinzer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Steve Hulshof (Nov 04)
- RE: New REmote Windows Exploit (MS04-029) raza (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) KF_lists (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Michael Riedel (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Valdis . Kletnieks (Nov 04)
- RE: New REmote Windows Exploit (MS04-029) raza (Nov 03)
- RE: New REmote Windows Exploit (MS04-029) Rich Parsons (Nov 03)
- RE: New REmote Windows Exploit (MS04-029) Barrie Dempster (Nov 04)