lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <OFAD9E4B72.F1C8F823-ON47256D75.002FACE4@ey.net>
From: Albert.Saerong at id.ey.com (Albert Saerong)
Subject: RPC DCOM Patches

I did with SP2 Servers and Workstation, the patch work fine and it did
close the hole.
For your environment, better do it in a none production environment first,
just-in-case there are problems with other applications that uses RPC.

cheers,



                                                                                                                                                 
                      "John Sec"                                                                                                                 
                      <john_sec_lists@...mail.com        To:       full-disclosure@...ts.netsys.com                                              
                      >                                  cc:                                                                                     
                      Sent by:                           Subject:  [Full-Disclosure] RPC DCOM Patches                                            
                      full-disclosure-admin@...ts                                                                                                
                      .netsys.com                                                                                                                
                                                                                                                                                 
                                                                                                                                                 
                      07/31/2003 07:31 PM                                                                                                        
                                                                                                                                                 
                                                                                                                                                 




The MS website says that the patch can only be applied to Windows 2000
systems with SP3 or SP4.  Has anybody tried to run the patch on an SP2
system?  Are NT 4 Workstations vulnerable too, or just NT 4 Servers?

Thanks

_________________________________________________________________
STOP MORE SPAM with the new MSN 8 and get 2 months FREE*
http://join.msn.com/?page=features/junkmail

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

----------------------------------------------------------
The information contained in this communication is intended solely for the
use of the individual or entity to whom it is addressed and others
authorized to receive it.   It may contain confidential or legally
privileged information.   If you are not the intended recipient you are
hereby notified that any disclosure, copying, distribution or taking any
action in reliance on the contents of this information is strictly
prohibited and may be unlawful. If you have received this communication in
error, please notify us immediately by responding to this email and then
delete it from your system. Ernst & Young is neither liable for the proper
and complete transmission of the information contained in this
communication nor for any delay in its receipt.

Note: If you have received a delivery failure report, it may be due to the
change in the Ernst & Young e-mail domain from "eyi.com" to "ey.com".
Could you please make the necessary amendment, if required, and resend the
message.




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ