[Full-Disclosure] IRC / Fyle the "Script Kiddy"

2003-08-10 Thread Export
just got spammed by some bot in irc, followed the link back down, figured somebody here might be interested in it the address is: (and DO NOT use IE to browse any further than the root of the server, the root might even be infected with some some such nasty, i dunno); http://12.230.121.121/ so

[Full-Disclosure] Administrivia: Archives Rebuilt - Bad JuJu

2003-08-10 Thread Len Rose
Well, I've gone and done it again. Roughly 11 hours ago we had a problem with a message index getting corrupted so I regenerated the archives using mailman's "arch" utility after fixing the damaged message. While that seemed to clear up the problem it also managed to change every url within the

Re: [Full-Disclosure] Cox is blocking port 135 - off topic

2003-08-10 Thread Joey
cox does block port 445 also, but i havent seen any exploits that use that port. even though its said that port 445 is vulnerable, where is the POC? --- Kurt Seifried <[EMAIL PROTECTED]> wrote: > Off topic: > > This won't help much at all. Windows 2000/XP run > Microsoft SMB over TCP on > 445 as

Re: [Full-Disclosure] Cox is blocking port 135 - off topic

2003-08-10 Thread Nick FitzGerald
[EMAIL PROTECTED] wrote: > cox does block port 445 also, but i havent seen any > exploits that use that port. even though its said that > port 445 is vulnerable, where is the POC? Well, regardless of whether there are any DCOM RPC exploits or worms based thereon using 445 or not, there certainly

[Full-Disclosure] Cox is blocking port 135 - off topic

2003-08-10 Thread Kurt Seifried
Off topic: This won't help much at all. Windows 2000/XP run Microsoft SMB over TCP on 445 as well (reduced overhead then 135/etc, no NetBIOS layer). When a client tries to connect to a remote host for file/print sharing/etc it connects on both ports 135 and 445, if a response is recieved from port

RE: +++++SPAM+++++ [Full-Disclosure] TCP ports 1025-1030 and DCOM exploit; false positive

2003-08-10 Thread Edward W. Ray
Do not know where this came from Regards, Edward W. Ray SANS GCIA, GCIH -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Edward W. Ray Sent: Sunday, August 10, 2003 10:28 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: +SPA

Re: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-10 Thread Matthew Murphy
"Jason Coombs" writes: > > Had the distribution binaries been modified, ISS may well > > have been bankrupted by customer lawsuits for negligence. > > Perhaps you could cite a legal case somewhere in the world that backs up this > assertion. To my knowledge nobody has ever lost a penny in court due

[Full-Disclosure] Re: DCOM Worm/scanner/autorooter !!!

2003-08-10 Thread Stephen
i confirm what joey said, the actual version do not replicate itself, but it's very very easy to a malicious lamer, to add options and commands to make a harder worm. indeed, the new version of the irc "worm" uses the universal offsets (http://www.k-otik.com/exploits/08.07.oc192-dcom.c.php) wich m

[Full-Disclosure] Re: Secure.dcom.exe

2003-08-10 Thread opticfiber
I did a search for Optix Pro and turned out a site that develops the software. From what I can tell it's very similar to software based trojans like bo2k, netbus ect...A detailed explanation of the trojan can be found at this url http://www.esecurityplanet.com/alerts/article.php/2197521 . The

Re: [Full-Disclosure] f-prot not catching mimail ?

2003-08-10 Thread Nik Reiman
As previously noted, the problem here seems to be with the f-prot binary, not the actual virus signatures/definitions. Try upgrading the f-prot package, and it'll probably work fine. -Nik [EMAIL PROTECTED] quoth: > >>I cannot see anything "special" in the MIME structure of Mimail that would > >>