Full Disclosure mailing list archives

Re: Time to patch Windows boxes with MS08-067


From: Juha-Matti Laurio <juha-matti.laurio () netti fi>
Date: Fri, 24 Oct 2008 10:41:48 +0300 (EEST)

I'm sure it's not a new Blaster, but when we today refer to Blaster/Lovsan from 2003 in the future we will refer to 
MS08-067,
because it was the first remarkable non-Office vulnerability used in targeted attacks.

This vulnerability has been reportedly the weapon of targeted attack during two or three weeks.
The size of malicious n2.exe files used is 397,312 bytes.

SANS ISC InfoCon meter is Yellow now
http://isc.sans.org/infocon.html

Juha-Matti

James Matthews [nytrokiss () gmail com] kirjoitti: 
We are still waiting to hear more about this Vulnerability. I guess the
BinDiff will come out soon.

On Thu, Oct 23, 2008 at 5:12 PM, Juha-Matti Laurio <
juha-matti.laurio () netti fi> wrote:

The out-of-the cycle update from Microsoft is MS08-067 - Vulnerability in
Server Service Could Allow Remote Code Execution:

http://www.microsoft.com/technet/security/Bulletin/ms08-067.mspx

Recommended workarounds:
-Disable the Server and Computer Browser services
-Block TCP ports 139 and 445 at the firewall

As reported in Tuesday's advance notification all major Windows versions
are affected, the bulletin rates Vista update as Important.

Microsoft has updated their AV products to protect against this RPC issue
too.

Juha-Matti

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://www.goldwatches.com/

http://www.jewelerslounge.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: