[194613] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Please run windows update now

daemon@ATHENA.MIT.EDU (Keith Medcalf)
Mon May 15 11:44:44 2017

X-Original-To: nanog@nanog.org
Date: Mon, 15 May 2017 09:44:28 -0600
In-Reply-To: <00c201d2cd8f$192f18a0$4b8d49e0$@c4.net>
From: "Keith Medcalf" <kmedcalf@dessus.com>
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org


I do not see any links to actually download the actual patches.  Just a bun=
ch of text drivel.


-- 
=CB=99u=CA=8Dop-=C7=9Dp=C4=B1sdn s=C4=B1 =C9=B9o=CA=87=C4=B1uo=C9=AF =C9=B9=
no=CA=8E 's=C4=B1=C9=A5=CA=87 p=C9=90=C7=9D=C9=B9 u=C9=90=C9=94 no=CA=8E =
=C9=9F=C4=B1

> -----Original Message-----
> From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of
> timrutherford@c4.net
> Sent: Monday, 15 May, 2017 09:23
> To: 'Josh Luthman'; 'Nathan Fink'
> Cc: nanog@nanog.org
> Subject: RE: Please run windows update now
> 
> I should clarify, the link in my email below is only for windows versions
> that are considered unsupported.
> 
> This one has links for the currently supported versions of windows
> 
> 	https://support.microsoft.com/en-us/help/4013389/title
> 
> 
> -----Original Message-----
> From: timrutherford@c4.net [mailto:timrutherford@c4.net]
> Sent: Monday, May 15, 2017 11:12 AM
> To: 'Josh Luthman' <josh@imaginenetworksllc.com>; 'Nathan Fink'
> <nefink@gmail.com>
> Cc: 'nanog@nanog.org' <nanog@nanog.org>
> Subject: RE: Please run windows update now
> 
> They even released updates for XP & 2003
> 
> http://www.catalog.update.microsoft.com/search.aspx?q=3D4012598
> 
> 
> -----Original Message-----
> From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Josh Luthman
> Sent: Monday, May 15, 2017 10:45 AM
> To: Nathan Fink <nefink@gmail.com>
> Cc: nanog@nanog.org
> Subject: Re: Please run windows update now
> 
> Link?
> 
> I only posted it as reference to the vulnerability.
> 
> 
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
> 
> On Sat, May 13, 2017 at 2:07 AM, Nathan Fink <nefink@gmail.com> wrote:
> 
> > I show MS17-010 as already superseded in SCCM
> >
> > On Fri, May 12, 2017 at 1:44 PM, Josh Luthman
> > <josh@imaginenetworksllc.com
> > >
> > wrote:
> >
> > > MS17-010
> > > https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
> > >
> > >
> > > Josh Luthman
> > > Office: 937-552-2340
> > > Direct: 937-552-2343
> > > 1100 Wayne St
> > > Suite 1337
> > > Troy, OH 45373
> > >
> > > On Fri, May 12, 2017 at 2:35 PM, JoeSox <joesox@gmail.com> wrote:
> > >
> > > > Thanks for the headsup but I would expect to see some references
> > > > to the patches that need to be installed to block the
> > > > vulnerability (Sorry for sounding like a jerk).
> > > > We all know to update systems ASAP.
> > > >
> > > > --
> > > > Later, Joe
> > > >
> > > > On Fri, May 12, 2017 at 10:35 AM, Ca By <cb.list6@gmail.com> wrote:
> > > >
> > > > > This looks like a major worm that is going global
> > > > >
> > > > > Please run windows update as soon as possible and spread the
> > > > > word
> > > > >
> > > > > It may be worth also closing down ports 445 / 139 / 3389
> > > > >
> > > > > http://www.npr.org/sections/thetwo-way/2017/05/12/
> > > > > 528119808/large-cyber-attack-hits-englands-nhs-hospital-
> > > > > system-ransoms-demanded
> > > > >
> > > >
> > >
> >
> 





home help back first fref pref prev next nref lref last post