Print

Print


FYI

--
Joe Budzyn                               [log in to unmask]
301 Computer Center                      Ph: (517) 355-4500 x162
Michigan State University
East Lansing, MI 48824

---------- Forwarded message ----------
Date: Tue, 27 Aug 2002 10:01:53 -0400
From: Kevin Gennuso <[log in to unmask]>
Reply-To: Windows NTBugtraq Mailing List <[log in to unmask]>
To: [log in to unmask]
Subject: MS02-045 exploit is out

Hi all,

I haven't seen much noise on this list about MS02-045 (Unchecked Buffer in
Network Share Provider Can Lead to Denial of Service (Q326830)), but the
implications are very nasty.  Any unpatched WinNT/2K/XP or .NET machine on
your network that's listening on port 139 and/or 445 can be crashed in
about two seconds with a malformed SMB packet.  I highly disagreed with
Microsoft's assessment that this was only a "moderate" threat level to
intranet and desktop systems because the exploit is so easy to perform.

It was bad enough in theory, but now a script-tot friendly GUI version of
the exploit has been posted on PacketStorm, and it works against all of
the above.  You can try for yourself at
http://packetstorm.decepticons.org/0208-exploits/SMBdie.zip

We worked through the weekend to get a large percentage of our boxen
patched - you may have to do the same.

The old "WinNuke" from the evil days of Win95 is back.

Thanks for listening,

Kevin