> There  appears  to  be  a  separate
> denial-of-service vulnerability in
> Microsoft's  RPC  interface  that  is  also 
> being  targeted [...] 
> Exploit  code  for  this  vulnerability has been
> publicly released

they are talking about this f**** exploit or another
???

http://www.k-otik.com/exploits/07.21.MS03-026.c.php

does the MS03-026 patch correct this shit ?

Regards. Stephen



--- Muhammad Faisal Rauf Danka <[EMAIL PROTECTED]>
wrote:
> 
> 
> Regards
> --------
> Muhammad Faisal Rauf Danka
> Date: Thu, 31 Jul 2003 16:59:41 -0400
> From: CERT Advisory <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: CERT Advisory CA-2003-19 Exploitation of
> Vulnerabilities in Microsoft RPC Interface 
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> CERT Advisory CA-2003-19 Exploitation of
> Vulnerabilities in Microsoft RPC
> Interface
> 
>    Original issue date: July 31, 2003
>    Last revised: -
>    Source: CERT/CC
> 
> 
> Appendix B. References
> 
>      * CERT/CC Vulnerability Note VU#561284 -
>        http://www.kb.cert.org/vuls/id/561284
>      * CERT/CC Vulnerability Note VU#326746 -
>        http://www.kb.cert.org/vuls/id/326746
>      * Microsoft Security Bulletin MS03-026 -
>       
>
http://microsoft.com/technet/security/bulletin/MS03-026.asp
>      * Microsoft      Knowledge      Base     
> article      823980      -
>        http://support.microsoft.com?kbid=823980
>   
>
______________________________________________________________________
> 
>    Authors: Chad Dougherty and Kevin Houle
>   
>
______________________________________________________________________
> 
> 
=== message truncated ===


__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to