The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


setSlice exploited in the wild - massively


<< Previous INDEX Search src / Print Next >>
Date: Sat, 30 Sep 2006 04:48:23 -0500 (CDT)
From: Gadi Evron <ge@linuxbox.org.>
To: bugtraq@securityfocus.com
Subject: setSlice exploited in the wild - massively
Message-ID: <Pine.LNX.4.21.0609300445490.18540-100000@linuxbox.org.>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-1.7.5 (linuxbox.org [127.0.0.1]); Sat, 30 Sep 2006 04:48:24 -0500 (CDT)
X-Virus-Scanned: antivirus-gw at tyumen.ru

Exploit code is available publicly:
http://www.milw0rm.com/exploits/2440

SANS diary:
http://isc.sans.org/diary.php?storyid=1742

And this is so massively exploited, it makes VML look cute. There's a
rootkit, some other malware, and haxdor! (a phishing trojan horse)

Thanks to Roger Thompson at explabs.com for first reporting it.

        Gadi.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру