[unisog] New (No kidding) RPC Vulnerability
andres at msu.edu
Wed Sep 10 21:07:19 GMT 2003
It is time for people (non-technical, I mean) that Windows is
a diseased operating system.
I'm planning on giving talks for my people about OpenBSD running
KDE, MacOS and probably other options.
Windows is rapidly becoming un-maintainable.
Beware: apparently some scanning tools think that a system
is vulnerable to MS03-026 when MS03-039 has been applied.
I have no distinct details on this, but have heard it from two
sources, one whom I know and trust.
Another fine MicroSoft moment.
On Wednesday 10 September 2003 04:50 pm, Eric Pancer wrote:
> On Wed, 2003-09-10 at 12:16:35 -0700, Dax proclaimed...
> > http://www.microsoft.com/technet/security/bulletin/MS03-039.asp
> > http://www.microsoft.com/security/security_bulletins/MS03-039.asp
> > Sooo...good job patching for Blaster everyone...Next!
> I'm getting to the point here that, when asked what the alternatives
> are, I'll just point them in a couple different places.
> What I'd love to see from Microsoft is a patch that binds the RPC
> listeners to 127.0.0.1 only.
More information about the unisog