According to VU#326746 this vulnerability is not the same as the vulnerability
described in CA-2003-16 (MS03-026), but the exploit you mentioned apparently seems to
address the same issue, however the exploit name and title is misleading.
Yet if you look at the code then you can find,
short port=135;
unsigned char buf1[0x1000];
printf("RPC DCOM DOS Vulnerability discoveried by Xfocus.org\n");
printf("Code by FlashSky,Flashsky xfocus org,benjurry,benjurry xfocus org\n");
printf("Welcome to http://www.xfocus.net\n");
And then if you look at the advisory again, you'll find this where the DoS issue is
mentioned:
"Exploit code for this vulnerability has been publicly released and also targets TCP
port 135. "
So the Exploit is the one you mentioned
Vulnerability Note for that issue is VU#326746
Advisory link from VU is http://www.xfocus.org/advisories/200307/4.html
Workaround so far, is to filter the ports described in advisory itself.
Regards
--------
Muhammad Faisal Rauf Danka
--- Stephen <[EMAIL PROTECTED]> wrote:
>> There appears to be a separate
>> denial-of-service vulnerability in
>> Microsoft's RPC interface that is also
>> being targeted [...]
>> Exploit code for this vulnerability has been
>> publicly released
>
>they are talking about this f**** exploit or another
>???
>
>http://www.k-otik.com/exploits/07.21.MS03-026.c.php
>
>does the MS03-026 patch correct this shit ?
>
>Regards. Stephen
>
>
>
>--- Muhammad Faisal Rauf Danka <[EMAIL PROTECTED]>
>wrote:
>>
>>
>> Regards
>> --------
>> Muhammad Faisal Rauf Danka
>> Date: Thu, 31 Jul 2003 16:59:41 -0400
>> From: CERT Advisory <[EMAIL PROTECTED]>
>> To: [EMAIL PROTECTED]
>> Subject: CERT Advisory CA-2003-19 Exploitation of
>> Vulnerabilities in Microsoft RPC Interface
>>
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>>
>> CERT Advisory CA-2003-19 Exploitation of
>> Vulnerabilities in Microsoft RPC
>> Interface
>>
>> Original issue date: July 31, 2003
>> Last revised: -
>> Source: CERT/CC
>>
>>
>> Appendix B. References
>>
>> * CERT/CC Vulnerability Note VU#561284 -
>> http://www.kb.cert.org/vuls/id/561284
>> * CERT/CC Vulnerability Note VU#326746 -
>> http://www.kb.cert.org/vuls/id/326746
>> * Microsoft Security Bulletin MS03-026 -
>>
>>
>http://microsoft.com/technet/security/bulletin/MS03-026.asp
>> * Microsoft Knowledge Base
>> article 823980 -
>> http://support.microsoft.com?kbid=823980
>>
>>
>______________________________________________________________________
>>
>> Authors: Chad Dougherty and Kevin Houle
>>
>>
>______________________________________________________________________
>>
>>
>=== message truncated ===
>
>
>__________________________________
>Do you Yahoo!?
>Yahoo! SiteBuilder - Free, easy-to-use web site design software
>http://sitebuilder.yahoo.com
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
_____________________________________________________________
---------------------------
[ATTITUDEX.COM]
http://www.attitudex.com/
---------------------------
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html