Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: nessus scan - epmap (135/tcp)
From: Ron <ron () skullsecurity net>
Date: Fri, 19 Dec 2008 11:07:00 -0600

m sesser wrote:
hi list,

some nessus scans have the following result:

Vulnerability found on port epmap (135/tcp)
 The remote host is running a version of Windows which has a flaw in
 its RPC interface which may allow an attacker to execute arbitrary code
 and gain SYSTEM privileges. There is at least one Worm which is
 currently exploiting this vulnerability. Namely, the MsBlaster worm.

Solution: see http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx

> ...
>
which tool is right?
is there a 3rd-party tool to test?
is nessus (2.2.9 ubuntu) state of the art?

thanks,
markus

The only way to really be sure if a signature is correct is to attempt an exploit (if you have permission!!)

Metasploit comes with a fairly stable exploit (as far as exploits go) for ms03-026.

Ron

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Security Trends Report from Cenzic
Stay Ahead of the Hacker Curve!
Get the latest Q2 2008 Trends Report now

www.cenzic.com/landing/trends-report
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]