Can you repeat the experiment with a patched box and replicate the results?
If so, that could be bad. It could just be a reworked exploit, though -- or perhaps there's a bug in the buffer overflow blocking code?
-Barry
bashis wrote:
Hi
Anyone heard about a file called "win2kup2date.exe" ? (Google says nothing found..;)
I did a controlled test with a XP Pro box w/o patches on Inet and this little thingy came on my testbox thrue some sort of RPC exploit, tftp'ed down this file from connecting machine, started with SYSTEM, and tries to connect up to IRC.
McAfee Virusscan Enterprise v8.0i with latest DAT's didn't find any strange with this file..
That was actually my test, v8.0 of McAfee virusscan have a future of "buffer overflow protection", it stopped the wellknown public RPC/DCOM exploit, but not the exploit that putted "win2kup2date.exe" on my testbox.
Well, so mutch for the new "buffer overflow protection" future.. crap.. ;)
Have a nice day /bashis
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html