mailing list archives
Re: New REmote Windows Exploit (MS04-029)
From: Valdis.Kletnieks () vt edu
Date: Thu, 04 Nov 2004 14:29:14 -0500
On Thu, 04 Nov 2004 11:07:47 EST, Michael Riedel said:
Ok so I was dumb enough to run it. Anyone else catch what commands they
run/ know of a way to track. I really don't feel like re-compiling gentoo.
Multiple people have posted what Perl code gets executed.
The problem is this:
$_ = `$_`;
That just runs as a command whatever the remote attacker asked you to.
Unless you had a tcpdump of all the traffic, you have no idea.
Moral of the story: Always test unknown binaries on a sacrificial
machine you're willing to rebuild, and always log the network traffic. ;)
In the meantime, unless you have a Tripwire of your binaries *and* your
source tree, I'd suggest re-downloading and recompiling, and hoping that
your compiler hasn't had a Ken Thompson Special installed in it. ;)
RE: New Remote Windows Exploit (MS04-029) Todd Towles (Nov 04)
Re: New REmote Windows Exploit (MS04-029) Peter Hickman (Nov 04)
RE: New REmote Windows Exploit (MS04-029) Jerome ATHIAS (Nov 04)
- RE: New REmote Windows Exploit (MS04-029), (continued)