mailing list archives
Re: MS WIN RPC DoS CODE FROM SPIKE v2.7
From: Dave Aitel <dave () immunitysec com>
Date: 22 Oct 2002 16:21:06 -0400
There are questions about whether this vulnerability works if you have
large enough amount of free memory. My exploit is tuned for my machine's
amount of free memory (not much), but there are variations that work on
For those who are interested, here is my domsrpcfuzz.sh header I used to
find this attack.
#using incorrect versionmajor for bonus fun!
Just copy that in, and let it run for a while. When it crashes, look at
your output file and it will have the random seed that crashed it. Then
you can do some more work to manually isolate the exact packet or
sequence that crashes it.
On Tue, 2002-10-22 at 14:25, lion wrote:
* MS WIN RPC DoS CODE FROM SPIKE v2.7
Dave Aitel <dave () immunitysec com>
Description: This is a digitally signed message part