Full Disclosure mailing list archives
Win-Trap captured DCOM-RPC exploit code, on the spot!
From: "Executable Security" <exurity () rogers com>
Date: Sun, 27 Jul 2003 22:48:00 -0500
I heard that one website claims that it has come up with ideas to trap the exploit code when it goes through the buffer overflow vulnerabilities. Check the http://www.phsecurity.com out and you will be amazed by its technology as I was. Its Win-Trap captured the exploit code even if the machine is un-patched with MS03-026 patch. That is great!! HC _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Win-Trap captured DCOM-RPC exploit code, on the spot! Executable Security (Jul 27)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Joel R. Helgeson (Jul 27)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Knud Erik Højgaard (Jul 28)
- Re: Win-Trap captured DCOM-RPC exploit code, on the spot! Anne Carasik (Jul 28)