Nmap Development mailing list archives

Re: Nmap suggestion script.


From: Richard Miles <richard.k.miles () googlemail com>
Date: Thu, 4 Oct 2012 13:18:10 -0500

Thanks Aleksandar, very appreciated your clarification and your script.

I guess this is a different vuln from the exploit released today at
metasploit blog post, right?

http://www.metasploit.com/modules/exploit/linux/samba/setinfopolicy_heap

Thanks.

On Fri, Sep 28, 2012 at 3:16 PM, Aleksandar Nikolic
<nikolic.alek () gmail com>wrote:

afaik, that is not a 0day, it's an exploit for one of the vulns patched
back in april
and I wrote a script for it back when it was published
http://nmap.org/nsedoc/scripts/samba-vuln-cve-2012-1182.html
note that there were several different vulns patched and assigned same CVE
as the vulns were in auto-generated piece of code.

Aleksandar

On 9/28/2012 7:04 PM, Richard Miles wrote:
Hi

Recently I saw this supposed 0day posted at FD, should be nice add a
check
for this bug at nmap similar to the smb security checks available for
windows.

http://downloads.securityfocus.com/vulnerabilities/exploits/52973.py

thanks
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: