[Dshield] MS03-039 exploit

Johannes B. Ullrich jullrich at sans.org
Wed Sep 17 03:57:38 GMT 2003


I think the new exploit everyone is refering to is this code:

http://www.xfocus.net/tools/200309/MS03-039-exp.c

it looks very similar to dcom.c, but its a windows C program. If
everybody gets it to run (on your own risk. This is untested malware
that may as well fry your machine and network), let me know what you
find.

From what I hear so far, it works. But as you can see from the code, it
only works against two particular Windows versions.



-- 
SANS - Internet Storm Center
http://isc.sans.org
PGP Key: http://isc.sans.org/jullrich.txt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://www.dshield.org/pipermail/list/attachments/20030916/98d96fa7/attachment.bin


More information about the list mailing list