RE: Exploit for Windows RPC may be in the wild!

From: Sumit (scorpio_chaserat_private)
Date: Tue Jul 29 2003 - 04:47:17 PDT

  • Next message: Jason Rumney: "Re: Anyone know this tool?"

    Does any one have working Exploit for "[NT] Buffer Overrun in RPC
    Interface Could Allow Code Execution"
    
    To be Specific Win NT 4.0
    
    
    With Regard,
    Sc0rPiO
    "Nature knows no indecencies; man invents them."
    
    
    -----Original Message-----
    From: James C. Slora, Jr. [mailto:Jim.Sloraat_private] 
    Sent: Monday, July 28, 2003 11:46 PM
    To: incidentsat_private
    Subject: RE: Exploit for Windows RPC may be in the wild!
    
    tEA-TiME wrote Sunday, July 27, 2003 6:34 PM
    > There could be another explanation for the flow of traffic to port
    135. Many
    > programs being released now for using the NET SEND command to
    advertise,
    > come with a built in "scanner" to see if the host is active beore
    wasting
    > the time sending the whole message. Some of these software makers also
    > suggest getting a port scanner and just scanning ports 135, 137, 138,
    139,
    > and 445 to see if a host is running and accepting NET messages.
    
    
    Yes many could be messenger spam probes. I've seen a marked increase in
    TCP 135 scanning over the past week, though. And I'm getting new scan
    combos (TCP 135 and 445 with no other ports) that strongly suggest RPC
    probing rather than messenger spam.
    
    ------------------------------------------------------------------------
    ---
    ------------------------------------------------------------------------
    ----
    
    
    ---------------------------------------------------------------------------
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Tue Jul 29 2003 - 09:53:37 PDT