lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <22CAE1C348259B4780A62F3416D1187D05929274@ex07.hca.corpad.net>
From: Paul.Tinsley at HCAhealthcare.com (Tinsley Paul)
Subject: RPC DCOM Patches

NT4 Workstation is vulnerable but is no longer supported, unless you have an
extended support contract with Microsoft.  Your only real options are to
turn off DCOM and/or put a personal firewall on the box.

-----Original Message-----
From: John Sec [mailto:john_sec_lists@...mail.com]
Sent: Thursday, July 31, 2003 7:32 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] RPC DCOM Patches


The MS website says that the patch can only be applied to Windows 2000 
systems with SP3 or SP4.  Has anybody tried to run the patch on an SP2 
system?  Are NT 4 Workstations vulnerable too, or just NT 4 Servers?

Thanks

_________________________________________________________________
STOP MORE SPAM with the new MSN 8 and get 2 months FREE*  
http://join.msn.com/?page=features/junkmail

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ