MS to release EMERGENCY patch for Windows today
MS to release EMERGENCY patch for Windows today
Normally I wouldn't post about this..but its very important from what I've researched on so make sure to run windows updates today!!
BE AWARE: Microsoft will release an emergency security patch today!!
[INDENT]Thursday October 23rd, 17:00 GMT (That is 19:00 for GMT+1+summertime)
All Microsoft said is that the vulnerability can be remotely exploited by malware.
Microsoft advices every Windows user / administrator to update their machines
Every currently supported Windows version is affected, so:
Windows 2000, Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows 2008, 2008 Core.
I'm not sure if all editions are affected, but it does look like it, so also Windows Embedded? Windows CE ? 2008 Core installation? Hyper-V Server?
To my knowlegde this is only the second time that Microsoft has released an out of band security patch.[/INDENT]
source
BE AWARE: Microsoft will release an emergency security patch today!!
[INDENT]Thursday October 23rd, 17:00 GMT (That is 19:00 for GMT+1+summertime)
All Microsoft said is that the vulnerability can be remotely exploited by malware.
Microsoft advices every Windows user / administrator to update their machines
Every currently supported Windows version is affected, so:
Windows 2000, Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows 2008, 2008 Core.
I'm not sure if all editions are affected, but it does look like it, so also Windows Embedded? Windows CE ? 2008 Core installation? Hyper-V Server?
To my knowlegde this is only the second time that Microsoft has released an out of band security patch.[/INDENT]
source
- RoscoPColtrane
- Posts: 6153
- Joined: Wed Sep 20, 2000 12:00 pm
- Location: Fort Worth, Texas
Thanks for the heads up! 
I bet some people at work are going to be running around like chickens with their heads chopped off.
I bet some people at work are going to be running around like chickens with their heads chopped off.
****************************************************************************************
Abit NF7-S 2.0, Barton 2500+ @ 2.2 Ghz, 2 Gig ddr3200, 80gig Seagate HDD, ATI x850 PRO @ 550/600, WinXP Pro
J B K M
Pittsburgh Steelers Super Bowl XL Champions!!!!!
Abit NF7-S 2.0, Barton 2500+ @ 2.2 Ghz, 2 Gig ddr3200, 80gig Seagate HDD, ATI x850 PRO @ 550/600, WinXP Pro
J B K M
Pittsburgh Steelers Super Bowl XL Champions!!!!!
- mountainman
- SG VIP
- Posts: 15451
- Joined: Tue Dec 26, 2000 12:00 am
- Location: Colorado
- RoundEye
- Posts: 18219
- Joined: Sun Jul 16, 2000 12:00 am
- Location: In a dry but moldy New Orleans, Louisiana
I just recieved this email,
Dear Microsoft Partner,
Because you are a member of the Microsoft Partner Program, ensuring you have the information you need about critical security issues is of the utmost importance to us. As you know, we typically release security bulletins once monthly. This alert is to provide you with an overview of the new security bulletin released (out of band) on Thursday, October 23, 2008. Microsoft has released security bulletin MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644), to address a vulnerability in all currently supported versions of Windows. This security update was released outside of the usual monthly security bulletin release cycle in an effort to protect customers.
We request that you take action immediately by first assessing and preparing your own systems and networks and applying the security update. Then reach out to your customers to assist them in securing their systems and networks by applying the update. The full bulletin for MS08-067 is available at http://www.microsoft.com/technet/securi ... 8-067.mspx
Sincerely,
The Microsoft U.S. Partner Program Team
Summary
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.
Sliding down the banister of life ..........................
- TNATireFryer
- Regular Member
- Posts: 357
- Joined: Fri May 07, 2004 6:19 pm
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
Update: New Worm Exploits Microsoft Bug
http://www.efluxmedia.com/news_Update_N ... 27467.html
http://www.efluxmedia.com/news_Update_N ... 27467.html
Well that didn't take long..Only two days after Microsoft released the patch, security researchers identified a new worm named Gimmiv, which exploited the vulnerability in the RPC service.
_______________________________________________
Vendor neutral certified in IT Project Management, IT Security, Cisco Networking, Cisco Security, Wide Area Networks, IPv6, IT Hardware, Unix, Linux, and Windows server administration
[SIGPIC][/SIGPIC]
Vendor neutral certified in IT Project Management, IT Security, Cisco Networking, Cisco Security, Wide Area Networks, IPv6, IT Hardware, Unix, Linux, and Windows server administration
[SIGPIC][/SIGPIC]
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
