PLEASE READ - VERY IMPORTANT WINDOW SECURITY FLAW:
http://zdnet.com.com/2100-1105_2-5055759.html
Patch:
http://www.microsoft.com/technet/tre...n/MS03-026.asp
Ben
PLEASE READ - VERY IMPORTANT WINDOW SECURITY FLAW:
http://zdnet.com.com/2100-1105_2-5055759.html
Patch:
http://www.microsoft.com/technet/tre...n/MS03-026.asp
Ben
=========
NOTHING TO BE SEE HERE, MOVE ALONG PLEASE....
:: of all the things i've lost i miss my mind the most ::
Thanks for the heads up on this....
... Could of been nasty :/
Thanks
downloading now
cheers mate
if war is the answer, then we are asking the wrong question
2 things i hate the most - xenophobia and the french
"chuffing"
Thanks
Downloading
Home cinema: Toshiba 42XV555DB Full HD LCD | Onkyo TX-SR705 | NAD C352 | Monitor Audio Bronze B2 | Monitor Audio Bronze C | Monitor Audio Bronze BFX | Yamaha NSC120 | BK Monolith sub | Toshiba HD-EP35 HD-DVD | Samsung BD-P1400 BluRay Player | Pioneer DV-575 | Squeezebox3 | Virgin Media V+ Box
PC: Asus P5B | Core2duo 2.13GHz | 2GB DDR2 PC6400 | Inno3d iChill 7900GS | Auzentech X-Plosion 7.1 | 250GB | 500GB | NEC DVDRW | Dual AG Neovo 19"
HTPC: | Core2Duo E6420 2.13GHz | 2GB DDR2 | 250GBx2 | Radeon X1300 | Terratec Aureon 7.1 | Windows MCE 2005
Laptop: 1.5GHz Centrino | 512MB | 60GB | 15" Wide TFT | Wifi | DVDRW
Thanks
You are of course unaffected if you are behind a firewall or NAT router:
So for private individuals the threat is more critical, but for the real world it's not actually that bad.To exploit this vulnerability, the attacker would require the ability to send a specially crafted request to port 135, 139, or 445 or any other specifically configured RPC port on the remote machine. For intranet environments, these ports would normally be accessible, but for Internet connected machines, these would normally be blocked by a firewall. In the case where these ports are not blocked, or in an intranet configuration, the attacker would not require any additional privileges.
cheers 4 the heads-up mate
if it ain't broke...fix it till it is
But a correctly written worm would mean only one computer on a intranet would need to be infected for it to spread.Originally posted by Shad
You are of course unaffected if you are behind a firewall or NAT router:
So for private individuals the threat is more critical, but for the real world it's not actually that bad.
Im going to compile it in a while and give it a shot at my unpatched 2000 sp4 server.
So, there Is _another_ exploit to add to the MS Windows list. How rare...
Quite frankly, as long as youve got a firewall It cant really do much, although there are ways around them.
moved to software
my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net
I reckon most of these things are created by the so-called 'security companies' to perpetuate their work.
Ta fo this
Tan
There are currently 1 users browsing this thread. (0 members and 1 guests)