TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: /m
from: John Beamish
date: 2006-08-01 20:02:18
subject: Re: ISS warns of new Microsoft Windows flaw

From: "John Beamish" 

Reminds me of Geo's story when he diligently tracked and cross-referenced
access info, IP addresses, etc. (I don't remember exaclty) to get some info
on a guy who was visiting a site/discussion group Geo. went to.

Finally, Geo. had him pinpointed and the next time he came online Geo told
him what he knew.  The discussion went on for a bit and then the guy said
"Sorry."  And Geo's NT session blue-screened.

Or something like that.  Geo. can provide all the details.

On Tue, 01 Aug 2006 18:43:40 -0400, /m  wrote:

>
> http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci120634
8,00.html
>
> ===
> Multiple versions of Microsoft Windows are vulnerable to a NULL pointer
> dereference error in the server driver, which attackers could exploit to
> crash a system using a specially crafted network packet. Atlanta-based
> vendor Internet Security Systems' (ISS) X-Force uncovered the glitch and
> released details Friday in an advisory, warning that an exploit is
> available in the wild.
>
> "Attackers can reliably cause Microsoft Windows to [go to a] blue
> screen," ISS said. "Users must reboot to recover from the
crash ƒ | As of
> this writing no patch is available for the vulnerability."
>
> ISS said the security hole affects:
> Microsoft Windows 2000 SP4
> Microsoft Windows Server 2003
> Microsoft Windows Server 2003 Itanium
> Microsoft Windows Server 2003 SP1
> Microsoft Windows Server 2003 SP1 Itanium
> Microsoft Windows Server 2003 x64 Edition
> Microsoft Windows XP Pro x64 Edition
> Microsoft Windows XP SP1
> Microsoft Windows XP SP2
> ===
>
>  /m

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.