[Dshield] New Microsoft Windows RPC vulnerability
rick at jaray.net
Wed Sep 17 03:23:34 GMT 2003
Well here's a better explanation: http://grc.com/default.htm
> -----Original Message-----
> From: list-bounces at dshield.org [mailto:list-bounces at dshield.org]On
> Behalf Of Alan Frayer
> Sent: Tuesday, September 16, 2003 8:47 PM - FamHost
> To: General DShield Discussion List
> Subject: RE: [Dshield] New Microsoft Windows RPC vulnerability
> Please pardon the stupid question, but are you talking about blocking
> those ports inbound or outbound? I know it doesn't seem to make much
> difference, but I've got sites connected through a VPN, so I don't do
> much in the way of blocking outbound, but I do block a lot of inbound
> and the ports you list are all within my inbound blocking list (inbound
> UDP >1023 is another story - still don't know what to do there).
> On Tue, 2003-09-16 at 18:21, Rick Leske wrote:
> > This is way old news.. really.. block 135, 137, 139, 445 ports.. at the
> > least. One of micro$oft's Totally Stupid things to leave open. Been
> > blocking them since the 70's
> > ~Rick
> Alan Frayer,CNE,CNI,CIW CI,MCP,Net+ - afrayer at frayernet.com
> Seeking an IT Mgmt/Network Admin position in the Tampa Bay Region
> If you would like to discuss an opportunity with me, please e-mail.
> list mailing list
> list at dshield.org
> To change your subscription options (or unsubscribe), see:
> Virus Scanned and Filtered by http://www.FamHost.com E-Mail System.
Virus Scanned and Filtered by http://www.FamHost.com E-Mail System.
More information about the list