---------- Forwarded message ---------- Date: Sat, 14 Apr 2007 18:40:53 +0200 From: Jerome Athias <jerome.athias@xxxxxxx> To: exploits@xxxxxxxxxxxxxxxxxxxxxx Subject: Re: [exploits] RPC vuln in DNS Server Quote from HD Moore: "This module has been added to the development version of Metasploit 3, it will be merged to 3.0-stable once 2003 support has been completed: http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/dcerpc/msdns_zonename.rb -HD" Tyler Reguly a écrit : > Greetings All, > > I figured I'd fire out an email and see if anyone has seen any other > details on this besides what Microsoft/Secunia/Heise has published... > > I plan on look into it more this evening, but unfortunately I've gotta > get through the work day first... I'll share anything I find tonight > on the subject. > > Tyler > Em. ht@xxxxxxxxxxxxxxxxxxx > Web. http://www.computerdefense.org > _______________________________________________ > exploits mailing list - in honour of rootshell > Send an exploit: exploits@xxxxxxxxxxxxxxxxxxxxxx > http://whitestar.linuxbox.org/mailman/listinfo/exploits > > > _______________________________________________ exploits mailing list - in honour of rootshell Send an exploit: exploits@xxxxxxxxxxxxxxxxxxxxxx http://whitestar.linuxbox.org/mailman/listinfo/exploits