Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: New REmote Windows Exploit (MS04-029)
From: Valdis.Kletnieks () vt edu
Date: Thu, 04 Nov 2004 14:29:14 -0500

On Thu, 04 Nov 2004 11:07:47 EST, Michael Riedel said:
Ok so I was dumb enough to run it.  Anyone else catch what commands they 
run/ know of a way to track.  I really don't feel like re-compiling gentoo.

Multiple people have posted what Perl code gets executed.

The problem is this:

 $_ = `$_`;

That just runs as a command whatever the remote attacker asked you to.
Unless you had a tcpdump of all the traffic, you have no idea.

Moral of the story:  Always test unknown binaries on a sacrificial
machine you're willing to rebuild, and always log the network traffic. ;)

In the meantime, unless you have a Tripwire of your binaries *and* your
source tree, I'd suggest re-downloading and recompiling, and hoping that
your compiler hasn't had a Ken Thompson Special installed in it. ;)

Attachment: _bin

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]