Announcement

Collapse
No announcement yet.

windows RPC exploit

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • windows RPC exploit

    hey,

    not sure if this was already posted but PATCH YOUR 'DOZE BOXES FOR CON!

    there's a major buffer overrun sploit out for windows NT - XP ...

    http://www.securityfocus.com/bid/8205/info/
    Peace,
    Mystic

    -{http://www.lostways.com}-

  • #2
    One of the first things I do after installing Win2K:

    Start->Run->DCOMCNFG->Default Protocols->Connection-Oriented TCP/IP->Remove

    I've never trusted Microsoft's RPCSS implement worth a damn. Not just because of the inevitable buffer-overrun exploits like this, but because I still suspect it has a backdoor built in. Its only a matter of time before someone finds it and writes a worm to traverse trusted hosts through firewalls and root entire domains.

    "By the time Skynet became self-aware, it had spread into millions of computer servers across the planet. Ordinary computers in office buildings, dorm rooms, everywhere... it was software... in cyberspace. There was no system core. It could not be shut down. The attack began at 6:18pm, on port 135, just as he said it would. Judgment Day. The day the human race was nearly destroyed by the weapons they built to protect themselves."

    ;)

    Comment

    Working...
    X