FYI -- Joe Budzyn [log in to unmask] 301 Computer Center Ph: (517) 355-4500 x162 Michigan State University East Lansing, MI 48824 ---------- Forwarded message ---------- Date: Tue, 27 Aug 2002 10:01:53 -0400 From: Kevin Gennuso <[log in to unmask]> Reply-To: Windows NTBugtraq Mailing List <[log in to unmask]> To: [log in to unmask] Subject: MS02-045 exploit is out Hi all, I haven't seen much noise on this list about MS02-045 (Unchecked Buffer in Network Share Provider Can Lead to Denial of Service (Q326830)), but the implications are very nasty. Any unpatched WinNT/2K/XP or .NET machine on your network that's listening on port 139 and/or 445 can be crashed in about two seconds with a malformed SMB packet. I highly disagreed with Microsoft's assessment that this was only a "moderate" threat level to intranet and desktop systems because the exploit is so easy to perform. It was bad enough in theory, but now a script-tot friendly GUI version of the exploit has been posted on PacketStorm, and it works against all of the above. You can try for yourself at http://packetstorm.decepticons.org/0208-exploits/SMBdie.zip We worked through the weekend to get a large percentage of our boxen patched - you may have to do the same. The old "WinNuke" from the evil days of Win95 is back. Thanks for listening, Kevin