lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <22CAE1C348259B4780A62F3416D1187D05929274@ex07.hca.corpad.net> From: Paul.Tinsley at HCAhealthcare.com (Tinsley Paul) Subject: RPC DCOM Patches NT4 Workstation is vulnerable but is no longer supported, unless you have an extended support contract with Microsoft. Your only real options are to turn off DCOM and/or put a personal firewall on the box. -----Original Message----- From: John Sec [mailto:john_sec_lists@...mail.com] Sent: Thursday, July 31, 2003 7:32 AM To: full-disclosure@...ts.netsys.com Subject: [Full-Disclosure] RPC DCOM Patches The MS website says that the patch can only be applied to Windows 2000 systems with SP3 or SP4. Has anybody tried to run the patch on an SP2 system? Are NT 4 Workstations vulnerable too, or just NT 4 Servers? Thanks _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists