Here is what it looks like The Analysis of LSD's
Buffer Overrun in Windows RPC Interface

http://www.xfocus.org/documents/200307/2.html

Cesar.
--- Peter Kruse <[EMAIL PROTECTED]> wrote:
> Hi,
> 
> From the code:
> RPC DCOM overflow Vulnerability discoveried by LSD
> Code by FlashSky,Flashsky xfocus
> org,benjurry,benjurry xfocus org
> 
> It sure looks like it ... Better patch up.
> 
> Med venlig hilsen // Kind regards
> 
> Peter Kruse
> Kruse Security
> http://www.krusesecurity.dk
> 
> -----Oprindelig meddelelse-----
> Fra: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] P�
> vegne af D C
> Sendt: 25. juli 2003 15:31
> Til: [EMAIL PROTECTED]
> Emne: Re: [Full-Disclosure] The French BUGTRAQ
> 
> 
> 
> I noticed there is a an exploit in the archive at
> http://www.K-otiK.com
> titled "MS Windows RPC DCOM Interface Buffer
> Overflow Exploit" (the file
> itself is 07.21.MS03-026.c).  I have not had a
> chance to review the code
> closely, yet... is this an exploit based on the
> Windows RPC advisory
> released by The Last Stage of Delirium recently?
> 
> 
> 
> 
> Do you Yahoo!?
> The New Yahoo! Search - Faster. Easier. Bingo.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
http://lists.netsys.com/full-disclosure-charter.html


__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to