The version number in eEye's supposed *new* scanner is the same version
number as the one they release for the previous RPC exploit, v1.0.4. In
my initial tests of the scanner, it did not find any vulnerable hosts for
the new RPC security hole on my network, except the ones that I already
-Disclosure
| Subject: Re: [Full-Disclosure] EEYE: Microsoft RPC Heap Corruption
| Vulnerability - Part II
|
|
|
| The version number in eEye's supposed *new* scanner is the same version
| number as the one they release for the previous RPC exploit, v1.0.4. In
| my initial tests of the scanner
On Wednesday, September 10, 2003 1:26 PM, [EMAIL PROTECTED]
wrote:
The version number in eEye's supposed *new* scanner is the
same version number as the one they release for the previous
RPC exploit, v1.0.4.
Pardon my interuption, but the version I downloaded about noon-ish PDT has
version
Yes, the correct version is now available on eEye's site.
Chris DeVoney