Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Scanners » MS05-039 Scan v1.0

This Directory TOP
Legion v.2.1
SuperScan v4.0
NMapWin 1.3.1
ipEye 1.2
DDoSPing v2.0
SQLScan v1.00
Xnsscan v0.22
MessengerScan v1.05
Top 15 free SQL Injection Scanners
Angry IP Scanner 3.0 beta 3
RPCScan v2.03
DSScan v1.00
Acunetix Web Vulnerability Scanner 8.0.20120613
MS05-051 Scan v1.0
Windows Vulnerability Scanner 1.48
AdminLoginFinder
NetSchedScan v1.0
NEWT Professional 2.5.226
Free IP Scanner 1.1
AVG LinkScanner 2012 12.0 Build 1873a4623
MS05-039 Scan v1.0
BOping v2.0
SNScan v1.05
A Review of Fingerprint Scanners
WebCruiser - Web Vulnerability Scanner 2.5.0
openAcunetix 2.04
WordPress Security Scanner
Scanner NessusWX 1.4.4 Win32
NmapW 2.0
Javascript LAN Scanner
Nessquik v2.5 - a Web-based Nessus Scanner
Paketto Keiretsu
Search

MS05-039 Scan v1.0

File Size: 55KB
Developer: http://www.foundstone.com
Description:     MS05-039 Scan 1.0 is a Windows based detection and analysis utility that can quickly and accurately identify Microsoft operating systems that are vulnerable to the multiple buffer overflow vulnerabilities released in the MS05-039 bulletin.

MS05-039 Scan is intended for use by enterprise system and network administrators as a fast and reliable utility for identifying at risk Microsoft systems in a passive manner. This tool is non-abrasive in nature and may be run in production environments during production hours.

Limitations of the tool:
The scanner is limited to 10 outgoing connections on WIndows XP SP2. This scanning limitation is caused by SP2. All other platforms will have 64 concurrent scanning threads running.

If you have anti-virus running it *may* detect this tool as an exploit. This tool *does NOT* exploit the vulnerabilty it simply determines if the machine is vulnerable or not.

Vulnerability Information:
There is a remotely exploitable vulnerability in the Plug and Play (PnP) RPC interface in Microsoft Windows.

Using a null session, an attacker could make an RPC request to the PnP interface on a Microsoft Windows system that could potentially execute arbitrary code.

This Foundstone check detects the absence of the patch by attempting to trigger the vulnerability in a nonintrusive manner over RPC.

Affected systems: Microsoft Windows Server 2003 (All Versions)
Microsoft Windows XP (All Versions)
Microsoft Windows 2000 (All Versions)


For more information see:
http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx
Download:   MS05-039 Scan v1.0

 

Sponsor Links

Sponsor Links

Share/Bookmark