[23652] in bugtraq

home help back first fref pref prev next nref lref last post

RE: Too much misleading advice on the Universal Plug-and-Play security hole

daemon@ATHENA.MIT.EDU (David LeBlanc)
Sun Dec 30 19:33:55 2001

From: "David LeBlanc" <dleblanc@mindspring.com>
To: "'Richard M. Smith'" <rms@computerbytesman.com>,
        "'Marc Maiffret'" <marc@eeye.com>, <bugtraq@securityfocus.com>
Date: Sat, 29 Dec 2001 13:53:22 -0800
Message-ID: <004b01c190b3$3d523cf0$0800a8c0@davenet.local>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In-Reply-To: <001d01c18efb$2a4b54c0$6401a8c0@rms>



> From: Richard M. Smith [mailto:rms@computerbytesman.com] 

>    "Customers using Windows 98, 98SE or ME should apply the patch 
>    if the Universal Plug and Play (UPNP) service is installed 
> and running"

As Matt pointed out, it will only be there if you've installed Internet
Connection Sharing that came with XP. I'm not 100% sure on this, being a
long-time NT-Win2k-XP bigot who hasn't run the Win9x line since '95 was
in beta.
 
> BTW, another option that the FBI is offering at the 
www.nipc.gov Web site is to turn off UPNP altogether:

   Update: "Universal Plug and Play Vulnerabilities"
   http://www.nipc.gov/warnings/advisories/2001/01-030-2.htm

Which is incorrect information that will leave you vulnerable because it
tells you to turn off the WRONG service. NIPC, unfortunately, isn't a
very good source of information right now. Vendor bulletins and this
list are better (IMHO).

David LeBlanc
dleblanc@mindspring.com


home help back first fref pref prev next nref lref last post