Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MS04-020 - POSIX Exploit developed


  • Please log in to reply
No replies to this topic

#1 harrywaldron

harrywaldron

    Security Reporter


  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:11:21 PM

Posted 17 July 2004 - 06:14 AM

Thankfully, this isn't a remote access exploit that a Blaster or Sasser like worm could exploit, but it could be triggered by an email or IM if POSIX services are enabled.

This is probably low-risk, but all Windows users should patch, patch, patch ... This new exploit code mainly illustrates "reverse engineering" is in process. The one's I'm most concerned about are MS04-022 and MS04-024, so it's important to "patch the roof before it rains" and perform a Windows update now


MS04-020 - POSIX Exploit developed
http://www.incidents.org/diary.php?date=2004-07-16

The ISC was notified earlier today that there was a public release of a Windows POSIX local privilege escalation exploit (MS04-020). Time to patch was last Tuesday. This is not a remote access issue, but one that still needs to be addressed and corrected.

BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users