Full Disclosure mailing list archives

Re: Exploit for MS06-040 Out?


From: Dave Aitel <dave () immunityinc com>
Date: Wed, 09 Aug 2006 14:36:36 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm not sure if "overnight" is correct - since we released it around
4pm EST into our Partner's program. This is something different from
CANVAS Professional in that it's more a program for large penetration
testing companies, government agencies, and security providers. But
it's still funny that you can write an exploit faster than someone can
go through Microsoft Update....sometimes I don't know why people
bother patching at all.

- -dave

Matt Davis wrote:
Just came across this on news.com regarding MS06-040 and homeland
security's response:

http://news.com.com/2100-7348_3-6103805.html?part=rss&tag=6103805&subj=news




"Overnight, popular hacker toolkits were updated with code that
allows researchers to check for the flaw and exploit it, said Neel
Mehta, a security expert at Internet Security Systems in Atlanta."

Did I completely miss exploit code being released in the wild for
that vulnerability?

TIA

_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFE2iszB8JNm+PA+iURAvEWAJ0RU+sURftT8RI6DMNz7VWUBvDOYQCeLN/+
Y6ag2D5CHVSFJpZFyLtoJwU=
=YV/P
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: