[Full-Disclosure] EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

2003-09-10 Thread Marc Maiffret
Here we go again. :-o -Marc Microsoft RPC Heap Corruption Vulnerability - Part II Release Date: September 10, 2003 Severity: High (Remote Code Execution) Systems Affected: Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Server 4.0 Microsoft Windows NT Server 4.0, Terminal

Re: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

2003-09-10 Thread Jeff . Urnaza
The version number in eEye's supposed *new* scanner is the same version number as the one they release for the previous RPC exploit, v1.0.4. In my initial tests of the scanner, it did not find any vulnerable hosts for the new RPC security hole on my network, except the ones that I already

RE: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

2003-09-10 Thread Marc Maiffret
-Disclosure | Subject: Re: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption | Vulnerability - Part II | | | | The version number in eEye's supposed *new* scanner is the same version | number as the one they release for the previous RPC exploit, v1.0.4. In | my initial tests of the scanner

RE: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

2003-09-10 Thread Chris DeVoney
On Wednesday, September 10, 2003 1:26 PM, [EMAIL PROTECTED] wrote: The version number in eEye's supposed *new* scanner is the same version number as the one they release for the previous RPC exploit, v1.0.4. Pardon my interuption, but the version I downloaded about noon-ish PDT has version

RE: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption Vulnerability - Part II

2003-09-10 Thread Jeff . Urnaza
Yes, the correct version is now available on eEye's site. Chris DeVoney