*

Recent Posts

Welcome, Guest. Please login or register.
April 28, 2024, 09:51:25 PM

Login with username, password and session length

Members
  • Total Members: 61
  • Latest: AciDeX
Stats
  • Total Posts: 28505
  • Total Topics: 1915
  • Online Today: 365
  • Online Ever: 455
  • (January 13, 2020, 04:13:29 PM)
Users Online
Users: 0
Guests: 285
Total: 285

Permissions

Author Topic: RPC patch (again)  (Read 2050 times)

0 Members and 1 Guest are viewing this topic.

Offline ZWarrior

  • Administrator
  • Hero Member
  • *****
  • Posts: 7798
  • Karma: 8
  • Shhh! Be wery wery qwiet...
    • View Profile
    • Ambush!
RPC patch (again)
« on: September 11, 2003, 12:50:56 PM »
Yes indeedy do!  M$ has patched the patch for RPC vulnerabilities.  Get it soon or get hit soon.  *Sigh*

See it in the below post.
--------------------------------
Zoë: Shepard, isn't the Bible kind of specific about killing?
Book: Very specific. It is, however, somewhat fuzzy around the area of kneecaps.

Offline ZWarrior

  • Administrator
  • Hero Member
  • *****
  • Posts: 7798
  • Karma: 8
  • Shhh! Be wery wery qwiet...
    • View Profile
    • Ambush!
RPC patch (again)
« Reply #1 on: September 11, 2003, 12:52:27 PM »
Dear Valued Microsoft Customer,

We are contacting you today to make you aware that we have released Microsoft Security Bulletin MS03-039 today, September 10, 2003.  This bulletin details three critical vulnerabilities in the Windows operating system and provides instructions for applying the corresponding patch.  While there is currently no active exploit of this vulnerability, if successfully exploited, these vulnerabilities would allow an attacker to gain control of the target system.  

We strongly encourage you to obtain and deploy this patch to any affected system that connects to your network; this includes systems on your local area network and remote or mobile systems.  For the most current information on affected systems and recommended remediation steps, please read the bulletin posted at:  http://www.microsoft.com/technet/security/bulletin/ms03-039.asp

We understand the potential effect this situation and the recommended remediation steps may have on you.  Microsoft is committed to providing you with information and tools to help run your enterprise safely and reliably on an on-going basis.  When we become aware of vulnerabilities, it is our goal to quickly share protection and remediation information and work in partnership with you to eliminate these kinds of threats to your business.  In order to help protect your computing environment from security vulnerabilities, we strongly encourage you to visit http://www.microsoft.com/technet/security/protect and implement the following three steps in your enterprise:

  1. Verify firewall configuration.  Audit Internet and intranet firewalls to ensure they comply with your security policy; these are your first line of defense.  In addition, evaluate using host-level firewalls such as the Internet Connection Firewall in Windows XP.  This is especially important for systems such as laptops and home PCs that connect to your network remotely.

  2. Stay up to date.  Use update services from Microsoft to keep your systems up to date.

 . Automatic Updates, available on Windows XP, Windows 2000 SP3 and SP4, and Windows Server 2003. Automatic Updates works with the Windows Update Web site to automate the process of updating Windows systems.

 . Software Update Services (SUS), a patch-distribution server available for download from our Web site. SUS enables you deploy a server in your business that Automatic Updates clients will use to get only approved and tested patches.  
In addition to using these update services, we strongly recommend that you subscribe to Microsoft's free security notification service at http://www.microsoft.com/securitynotification, so that you are proactively kept aware of new security issues.

  3. Use and keep antivirus software up-to-date.  Antivirus software programs will help protect your systems against many viruses, worms, Trojan horses, and other malicious code.  To protect your systems from new viruses, it's also important to obtain up-to-date antivirus signatures through a subscription service from the antivirus software vendor. You should not let remote users or laptops connect to your network unless they have up-to-date antivirus software installed. In addition, consider using antivirus software in multiple points of your computer infrastructure, such as on edge Web proxy systems, as well as on email servers and gateways.

You should also protect your network by requiring employees to take the same three steps with home and laptop PCs they use to remotely connect to your enterprise, and by encouraging them to talk with friends and family to do the same with their PCs.  To make this easier, we have set up a new Web site to assist PC users at http://www.microsoft.com/protect.

Again, we want to encourage you to read this security bulletin and deploy the patch to your systems.  We want to thank you for your patience and work with you to protect your business from these kinds of security threats.
 
Thank you,
Microsoft Corporation

For information about Microsoft's privacy policies, please go to http://www.microsoft.com/info/privacy.htm
--------------------------------
Zoë: Shepard, isn't the Bible kind of specific about killing?
Book: Very specific. It is, however, somewhat fuzzy around the area of kneecaps.

Offline ZWarrior

  • Administrator
  • Hero Member
  • *****
  • Posts: 7798
  • Karma: 8
  • Shhh! Be wery wery qwiet...
    • View Profile
    • Ambush!
RPC patch (again)
« Reply #2 on: September 12, 2003, 11:44:22 AM »
You can test your system for vulnerability to this problem here: http://www.secunia.com/MS03-032/

Test it altogether here: https://testzone.secunia.com/
--------------------------------
Zoë: Shepard, isn't the Bible kind of specific about killing?
Book: Very specific. It is, however, somewhat fuzzy around the area of kneecaps.

 

Contacts