| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ISS warns of new Microsoft Windows flaw |
From: "Geo"
If your firewall blocks smb (port 139 and 445) from remote unknown IP's
then this isn't much of a concern. Think of it as a blockable version of
winnuke. Winnuke was actually much worse as it was the tcp/ip stack, this
requires access to smb which most firewalls and all NAT devices block by
default. Anyone running the XP firewall is already protected.
Geo.
"/m" wrote in message
news:h7mvc2dm40scbghcdp9sfo4kit002nd0nb{at}4ax.com...
>
>
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1206348,
00.html
>
> ===
> Multiple versions of Microsoft Windows are vulnerable to a NULL pointer
> dereference error in the server driver, which attackers could exploit to
> crash a system using a specially crafted network packet. Atlanta-based
> vendor Internet Security Systems' (ISS) X-Force uncovered the glitch and
> released details Friday in an advisory, warning that an exploit is
> available in the wild.
>
> "Attackers can reliably cause Microsoft Windows to [go to a] blue
> screen," ISS said. "Users must reboot to recover from the
crash . As of
> this writing no patch is available for the vulnerability."
>
> ISS said the security hole affects:
> Microsoft Windows 2000 SP4
> Microsoft Windows Server 2003
> Microsoft Windows Server 2003 Itanium
> Microsoft Windows Server 2003 SP1
> Microsoft Windows Server 2003 SP1 Itanium
> Microsoft Windows Server 2003 x64 Edition
> Microsoft Windows XP Pro x64 Edition
> Microsoft Windows XP SP1
> Microsoft Windows XP SP2
> ===
>
> /m
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.