Date: Wed, 27 Aug 2003 10:47:14 -0300 From: Dexter J <lamealameadingdongnopsamlamelame.org> Subject: OT - Re: .. again with the fakakama patchs ..
Salutations: No pwob - I suspect they have already got it covered given what you outlined previously regards ops - but I thought I'd better kick it out other folks not as well fettled.. I've set up my thin server prototype here so that it returns probe attempts to sender with a shutdown attempt - I bag one or two rogue machines a week and I noticed a couple of new variants which I think may be related to this exploit.. All part of the good 'carma' thing brother - so the good lord doesn't see fit to smote my turbo.. :) .. -- J Dexter - webmaster - http://www.dexterdyne.org/ all tunes - no cookies no subscription no weather no ads no news no phone in - RealAudio 8+ Required - all the Time Radio Free Dexterdyne Top Tune o'be-do-da-day Black Eyed Peas - Where is the Love (O'YAZZ! J Dexter) http://www.dexterdyne.org/888/154.RAM MeatballTurbo wrote: > > In article <3F4C0B20.E42B52AEnopsamlamelame.org>, > lamealameadingdongnopsamlamelame.org says... > > Salutations: > > > > Heads up - doesn't appear to be another hippo floating by just yet - but MS > > SQL/XML/Access/.NET looks like its up for another beating.. > > > > http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-033.asp > > > > http://www.symantec.com/avcenter/security/Content/8455.html > > > > Which brings up an important advise opportunity for all you folks out there > > with healthy lives somewhere 25 feet beyond a stinking wall jack.. > > > > This particular buffer overrun is limited by the level of access you > > provide the exploit when you - don't - setup a user account to do your > > everyday surf 'n salary stuff on windows systems.. The Administrator > > account is for administration.. > Cheers. Forwarded onto our engineer team. Don't know if they have the > details yet, but better safe. > > -- > The poster formerly known as Skodapilot. > http://www.bouncing-czechs.com