Re: DCOM RPC exploit (dcom.c)

From: S G Masood (sgmasoodat_private)
Date: Sat Jul 26 2003 - 19:53:21 PDT

  • Next message: Quan Van Truong: "PBLang Cross Site Scripting Vulnerability (Newest version)"

    Hello list,
    
    
    The Dcom.c compiles neatly on Cygwin with GCC 3.2 when
    the "#include <error.h>" line is removed.
    
    *Very* accurate. If the machine is vulnerable, the
    exploit will almost always succeed on the first
    attempt.
    
    I've successfully tested it on about 16 boxes and each
    one was rooted on the first try. Among these were
    Win2k with SP0, SP1, SP3 while two were WinXP(SP level
    not known). Before running the exploit, the machines
    were confirmed as vulnerable with the Eeye tool(on a
    side note, while the Eeye tool did recognise many
    vulnerable boxes, it failed to recognise some of them,
    though, they were vulnerable).
    
    One glitch is that the exploitation is not very
    stealth. All RPC/COM based functions stop working
    completely after exploitation and fail to heal until
    the machine is restarted. Many of these functions are
    quite visible and easily noticeable(drag&drop,
    clipboard, property sheets, etc., for example). This
    happens without exception.
    
    The exploit mostly times out when run against remote
    hosts.
    
    Hope we are all patched before Tim Mullen's
    "Mescaline"(http://securityfocus.com/columnists/174)
    becomes a reality.
    
    One last advice - think twice before doing any thing
    risky with the exploit. Though highly accurate, it is
    very noisy.
    
    
    Regards,
    
    S.G.Masood
    
    Hyderabad,
    India.
    
    __________________________________
    Do you Yahoo!?
    Yahoo! SiteBuilder - Free, easy-to-use web site design software
    http://sitebuilder.yahoo.com
    



    This archive was generated by hypermail 2b30 : Mon Jul 28 2003 - 15:17:33 PDT