Full Disclosure mailing list archives
Re: [exploits] RPC vuln in DNS Server (fwd)
From: Gadi Evron <ge () linuxbox org>
Date: Sat, 14 Apr 2007 19:23:16 -0500 (CDT)
---------- Forwarded message ---------- Date: Sat, 14 Apr 2007 18:40:53 +0200 From: Jerome Athias <jerome.athias () free fr> To: exploits () whitestar linuxbox org Subject: Re: [exploits] RPC vuln in DNS Server Quote from HD Moore: "This module has been added to the development version of Metasploit 3, it will be merged to 3.0-stable once 2003 support has been completed: http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/dcerpc/msdns_zonename.rb -HD" Tyler Reguly a écrit :
Greetings All, I figured I'd fire out an email and see if anyone has seen any other details on this besides what Microsoft/Secunia/Heise has published... I plan on look into it more this evening, but unfortunately I've gotta get through the work day first... I'll share anything I find tonight on the subject. Tyler Em. ht () computerdefense org Web. http://www.computerdefense.org _______________________________________________ exploits mailing list - in honour of rootshell Send an exploit: exploits () whitestar linuxbox org http://whitestar.linuxbox.org/mailman/listinfo/exploits
_______________________________________________ exploits mailing list - in honour of rootshell Send an exploit: exploits () whitestar linuxbox org http://whitestar.linuxbox.org/mailman/listinfo/exploits _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: [exploits] RPC vuln in DNS Server (fwd) Gadi Evron (Apr 15)