Microsoft have issued an updated hotfix for the RPC service on NT/2000/XP/2003-based machines.
The RPC exploit was the one used by the BLASTER worm in August, causing PCs to reboot, infect others PCs and attempt a denial of service on Windows Update.
Microsoft have taken a look into the RPC service in more detail and found some more potentially-exploitable vulnerabilities, so here's a new patch...
Running Windows Update should show you the critical patch(es) you need to apply, but here's the Microsoft Security Bulletin:
http://www.microsoft.com/technet/tre...n/MS03-039.asp
Microsoft Security Bulletin MS03-039
Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
Originally posted: September 10, 2003
Summary
Who should read this bulletin: Users running Microsoft® Windows ®
Impact of vulnerability: Three new vulnerabilities, the most serious of which could enable an attacker to run arbitrary code on a user’s system.
Maximum Severity Rating: Critical
Recommendation: System administrators should apply the security patch immediately
http://www.microsoft.com/security/se.../ms03-039.asp.
Affected Software:
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Server® 4.0
Microsoft Windows NT Server 4.0, Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003