> There appears to be a separate > denial-of-service vulnerability in > Microsoft's RPC interface that is also > being targeted [...] > Exploit code for this vulnerability has been > publicly released
they are talking about this f**** exploit or another ??? http://www.k-otik.com/exploits/07.21.MS03-026.c.php does the MS03-026 patch correct this shit ? Regards. Stephen --- Muhammad Faisal Rauf Danka <[EMAIL PROTECTED]> wrote: > > > Regards > -------- > Muhammad Faisal Rauf Danka > Date: Thu, 31 Jul 2003 16:59:41 -0400 > From: CERT Advisory <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Subject: CERT Advisory CA-2003-19 Exploitation of > Vulnerabilities in Microsoft RPC Interface > > > -----BEGIN PGP SIGNED MESSAGE----- > > CERT Advisory CA-2003-19 Exploitation of > Vulnerabilities in Microsoft RPC > Interface > > Original issue date: July 31, 2003 > Last revised: - > Source: CERT/CC > > > Appendix B. References > > * CERT/CC Vulnerability Note VU#561284 - > http://www.kb.cert.org/vuls/id/561284 > * CERT/CC Vulnerability Note VU#326746 - > http://www.kb.cert.org/vuls/id/326746 > * Microsoft Security Bulletin MS03-026 - > > http://microsoft.com/technet/security/bulletin/MS03-026.asp > * Microsoft Knowledge Base > article 823980 - > http://support.microsoft.com?kbid=823980 > > ______________________________________________________________________ > > Authors: Chad Dougherty and Kevin Houle > > ______________________________________________________________________ > > === message truncated === __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
