Home page logo
/

dailydave logo Dailydave mailing list archives

Re: A bad month for MS!
From: "Olef Anderson" <olef.anderson () gmail com>
Date: Thu, 23 Oct 2008 11:27:28 -0700

Funny! how you just said that!

I can quote myself saying "what a bad month for China" just this morning,
having 2 of your arsenal die in one month must hurt bad but certainly they
should have plenty more handy. I am hopeful that U.S. will catch up on that
front whenever the federal employees stop padding each other on the back and
say how great they are just because they happen to use IOCTL's for Solaris
shellcodes. Maybe when everybody is done blowing each other off, we can do
some catching up ;>

Also god forbid, we might even consider not reporting bugs anymore!

regards,
Olef



On Thu, Oct 23, 2008 at 10:45 AM, Dave Aitel <dave () immunityinc com> wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Recently Kostya finished off the IPP exploit (MS08-062) which turns
out to be much more useful than I expected for penetration tests.
Although most penetration tests start out "blind" and you don't have a
username and password, in the real world, a hacker WOULD have a
username or password to the domain, if it's big enough. But since we
rarely do , I was happy to see that on our latest penetration test
there were several machines set up to offer internet printing
anonymously.  Of course, in this particular case, proper network
exfiltration filtering prevented them from getting exploited, but it
was interesting to see real world machines vulnerable to such a thing.

The question you always have is "How reliable is reliable" and I'd
have to say that Kostya's IPP exploit is probably 100% against
standard IIS 5.0, for those of you still running that (welcome to 2008
:>!). MS08-062 is not a bug you would find with a fuzzer, so having
people vulnerable by default makes it obvious that there was a lot of
value to whoever found it, and they were probably using it pretty
widely for them to have gotten caught. This is worse news for MS than
it originally seemed.

This server service bug, on the other hand, is exactly as bad as it
would seem. It's the kind of news for Microsoft (and their customers,
of course) that creates real-world sales problems (much like the
RedHat compromise should have). The world has changed a lot since the
last time a remote vulnerability of this nature came out - now the
distribution of high quality exploits is going to be essentially
instantaneous.

It will be interesting to see how organizations react to this - or if
they react at all.

- -dave

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJALg9tehAhL0gheoRAu9PAJ97HRWZbgR7Eia02u1oCysP8ah6KgCeJ1uI
esxhUFYRvz9+6Wlj0nu774w=
=Bv+0
-----END PGP SIGNATURE-----

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault