"Bassett, Mark" <[EMAIL PROTECTED]> to me:

> >Well, it is the most widely supported default interface that is 
> >vulnerable.  It would be a very unusual machine that is vulnerable on 
> >some other port and _NOT_ on 135, so what is the payoff for writing an 
> >exploit (at least a "prrof of concept") that tries other ports?
> 
> Because 9 times out of 10 port 135 is blocked by some sort of firewall,
> whilst port 80 is not blocked on a web server.  

Yes, and about 999,999 times out of a million the target machines won't 
have ncacn_http enabled and thus it is moot whether they also have the 
equally rare COM Internet Services enabled.

My (rhetorical) question was what is the payoff for trying those other 
oddball ports.  The point was that the services that have to enabled 
for this to be exploited over port 80 are so rare as to probably be 
considered severely endangered, if not extinct.


Regards,

Nick FitzGerald

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to