[195] in Security FYI

home help back first fref pref prev next nref lref last post

[Security-fyi] SANS News Flash

daemon@ATHENA.MIT.EDU (Linda A. LeBlanc)
Wed Jul 23 12:47:19 2003

Message-Id: <5.1.0.14.2.20030723124424.02111538@po12.mit.edu>
Date: Wed, 23 Jul 2003 12:45:10 -0400
To: security-fyi@MIT.EDU
From: "Linda A. LeBlanc" <leblancl@MIT.EDU>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
cc: itlt@MIT.EDU
Errors-To: security-fyi-bounces@mit.edu


FLASH ALERT

The first story below describes a critical Microsoft vulnerability
(MS03-026) that affects Windows NT, Windows 2000, Windows 2003 Server,
and Windows XP.  A worm using this vulnerability would find more than
ten times as many potential victims as Code Red.  If an efficient worm
is launched, so many infected systems will be searching for victims that
you will not be able to download the patches before being infected.  Do
*not* rely entirely on blocking traffic to port 135 as a defense.
Install the patches.  If you needed a reason to launch a sweeping
vulnerability elimination program on all Windows systems -- including
the home computers from which your users connect to your corporate
systems -- this is it.

                                 Alan

***********************************************************************
SANS NewsBites                July 23, 2003             Vol. 5, Num. 29
***********************************************************************

_______________________________________________
Security-fyi mailing list
Security-fyi@mit.edu
http://mailman.mit.edu/mailman/listinfo/security-fyi

home help back first fref pref prev next nref lref last post