[unisog] New (No kidding) RPC Vulnerability
Martin, James E.
martin at more.net
Wed Sep 10 22:02:13 GMT 2003
A downstream campus shut off the dorm ports on the first day back at school last month, then gave students a choice:
A. They could have a port once they'd been certified as patched to current stable and virus-free by IT staff, or
B. Users with a non-Microsoft operating system were given a number to call for immediate access.
Words cannot express my personal and professional gratitude. :)
From: Matt Crawford [mailto:crawdad at fnal.gov]
Sent: Wednesday, September 10, 2003 4:26 PM
Cc: unisog at sans.org
Subject: Re: [unisog] New (No kidding) RPC Vulnerability
> Sooo...good job patching for Blaster everyone...Next!
I was just saying we should set up a table in the Atrium and give every
windows user a choice of CDROMs:
Pick from box A and get all the current windows patches.
Pick from box B and get a localized Red Hat Linux installation.
If you pick from A, come again next week.
More information about the unisog