[148370] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Possible New Zero Day Microsoft Windows 3389 vulnerability -

daemon@ATHENA.MIT.EDU (Alex Brooks)
Fri Jan 13 08:40:10 2012

In-Reply-To: <CA7E867D448D8B489EFF2E97E266038A1DACA657@RA-EX01.raprinting.com>
From: Alex Brooks <askoorb+nanog@gmail.com>
Date: Fri, 13 Jan 2012 13:38:44 +0000
To: James Braunegg <james.braunegg@micron21.com>, nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hello,

On Fri, Jan 13, 2012 at 12:36 PM, James Braunegg
<james.braunegg@micron21.com> wrote:
>
> Hey All,
>
> Just posting to see if anyone has seen any strange outbound traffic on po=
rt 3389 from Microsoft Windows Server over the last few hours.
>
> We witnessed an alarming amount of completely independent Microsoft Windo=
ws Servers, =A0each on separate vlan and subnets (ie all /30 and /29 alloca=
tions) with separate gateways on and completely separate customers, but all=
 services were within the same 1.x.x.x/16 allocation all simultaneously sen=
d around 2mbit or so data to a specific target IP address.
>

Have you contacted Microsoft yet?
https://support.microsoft.com/oas/default.aspx?gprid=3D1163&st=3D1&wfxredir=
ect=3D1&sd=3Dgn

If you have a support contract (which you probably do) you'll get a
very quick response if you choose the "security" option.

Whatever you do, do let everyone know what the problem turns out to be.

Alex


home help back first fref pref prev next nref lref last post