Full Disclosure mailing list archives
Re: Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007)
From: Thomas Kerbl <thomas.kerbl () fh-hagenberg at>
Date: Mon, 16 Feb 2004 04:23:19 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Christophe Devine wrote: | Stephen wrote: | | |>http://www.k-otik.com/exploits/02.14.MS04-007-dos.c.php | | | Apparently an early version of the exploit got somewhat leaked without | my prior knowledge. So, here is an updated version that should also work | on port 139. It was only tested with Windows 2000 Pro SP4 (fr), but may | also be successful against Windows XP; don't bother asking me for an | exploit that yields a shell. I could verify your results on a Windows 2000 Pro SP3 (en), targeting port 445. Result: http://members.kremstalnet.at/kerbl/exploit/lsass.gif (won't be up there forever) greetings, Thomas Kerbl - -- ~ FH-Hagenberg: Computer- & Media Security ~ http://cms.fh-hagenberg.at ~ my GPG key ID: 0x924042D1 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFAMDeaQVo4Q5JAQtERAoFZAJ0XE06h56KFWCNEWVXvG5kkVPfnSQCgnfF+ lE0olsAMAxzPkKD42+5Vlhc= =EIDM -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Christophe Devine (Feb 14)
- Re: Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Stephen (Feb 15)
- Re: Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Ganbold (Feb 15)
- Re: Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Thomas Kerbl (Feb 15)
- Re: Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Byron Copeland (Feb 15)
- Re: Re: Microsoft Windows ASN.1 LSASS.EXE Remote Exploit (MS04-007) Stephen (Feb 16)
