[195] in Security FYI
[Security-fyi] SANS News Flash
daemon@ATHENA.MIT.EDU (Linda A. LeBlanc)
Wed Jul 23 12:47:19 2003
Message-Id: <5.1.0.14.2.20030723124424.02111538@po12.mit.edu>
Date: Wed, 23 Jul 2003 12:45:10 -0400
To: security-fyi@MIT.EDU
From: "Linda A. LeBlanc" <leblancl@MIT.EDU>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
cc: itlt@MIT.EDU
Errors-To: security-fyi-bounces@mit.edu
FLASH ALERT
The first story below describes a critical Microsoft vulnerability
(MS03-026) that affects Windows NT, Windows 2000, Windows 2003 Server,
and Windows XP. A worm using this vulnerability would find more than
ten times as many potential victims as Code Red. If an efficient worm
is launched, so many infected systems will be searching for victims that
you will not be able to download the patches before being infected. Do
*not* rely entirely on blocking traffic to port 135 as a defense.
Install the patches. If you needed a reason to launch a sweeping
vulnerability elimination program on all Windows systems -- including
the home computers from which your users connect to your corporate
systems -- this is it.
Alan
***********************************************************************
SANS NewsBites July 23, 2003 Vol. 5, Num. 29
***********************************************************************
_______________________________________________
Security-fyi mailing list
Security-fyi@mit.edu
http://mailman.mit.edu/mailman/listinfo/security-fyi