Tomas
Banned
Microsoft have another critical vulnerability in the Windows NT/2000/XP/2003 line of OSes, allowing a remote attacker to run arbitrary code.
In other words, this probably carries about the same risk as the well-documented RPC hole exploited by MSBlaster and Nachi.
A Knowledgebase article is also available.
Given the experience of the RPC exploit, this probably gives administrators a couple of weeks to patch all the systems in their organisations.
Again.
Shucks, we haven't even finished patching the last RPC flaw yet.
You might want to keep your laptop's batteries charged; this NewsForge article suggests that the Blaster worm may have played a role in the August 14th blackout affecting the eastern U.S. Those with multiple machines to patch might want to visit Microsoft's Software Update Services (whitepaper), a tool for "managing and distributing critical Windows patches.
Enjoy!
In other words, this probably carries about the same risk as the well-documented RPC hole exploited by MSBlaster and Nachi.
A Knowledgebase article is also available.
Given the experience of the RPC exploit, this probably gives administrators a couple of weeks to patch all the systems in their organisations.
Again.
Shucks, we haven't even finished patching the last RPC flaw yet.
You might want to keep your laptop's batteries charged; this NewsForge article suggests that the Blaster worm may have played a role in the August 14th blackout affecting the eastern U.S. Those with multiple machines to patch might want to visit Microsoft's Software Update Services (whitepaper), a tool for "managing and distributing critical Windows patches.
Enjoy!