TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: John Beamish
from: /m
date: 2006-08-01 20:07:20
subject: Re: ISS warns of new Microsoft Windows flaw

From: /m 


Yup, I remember Geo. telling that story.   It was two or three years
ago, if my memory serves me well.

 /m

On Tue, 01 Aug 2006 20:02:19 -0400, "John Beamish"
 wrote:

>Reminds me of Geo's story when he diligently tracked and cross-referenced
>access info, IP addresses, etc. (I don't remember exaclty) to get some
>info on a guy who was visiting a site/discussion group Geo. went to.
>
>Finally, Geo. had him pinpointed and the next time he came online Geo told
>him what he knew.  The discussion went on for a bit and then the guy said
>"Sorry."  And Geo's NT session blue-screened.
>
>Or something like that.  Geo. can provide all the details.
>
>On Tue, 01 Aug 2006 18:43:40 -0400, /m  wrote:
>
>>
>> http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci12063
48,00.html
>>
>> ===
>> Multiple versions of Microsoft Windows are vulnerable to a NULL pointer
>> dereference error in the server driver, which attackers could exploit to
>> crash a system using a specially crafted network packet. Atlanta-based
>> vendor Internet Security Systems' (ISS) X-Force uncovered the glitch and
>> released details Friday in an advisory, warning that an exploit is
>> available in the wild.
>>
>> "Attackers can reliably cause Microsoft Windows to [go to a] blue
>> screen," ISS said. "Users must reboot to recover from
the crash … As of
>> this writing no patch is available for the vulnerability."
>>
>> ISS said the security hole affects:
>> Microsoft Windows 2000 SP4
>> Microsoft Windows Server 2003
>> Microsoft Windows Server 2003 Itanium
>> Microsoft Windows Server 2003 SP1
>> Microsoft Windows Server 2003 SP1 Itanium
>> Microsoft Windows Server 2003 x64 Edition
>> Microsoft Windows XP Pro x64 Edition
>> Microsoft Windows XP SP1
>> Microsoft Windows XP SP2
>> ===
>>
>>  /m

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.