lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20031016004256.GJ15963@rdlg.net>
From: Robert.L.Harris at rdlg.net (Robert L. Harris)
Subject: New Microsoft security bulletins today



Yes, I got the same.  Somethings I found though:

It's complaining about "basesrv" a dynamicly linked library.  I rebooted
into Linux and ran some finds and found 3 files:

WINNT/$NtUninstallKB824141$/basesrv.dll
WINNT/ServicePackFiles/i386/basesrv.dll
WINNT/system32/dllcache/BASESRV.DLL

the one in system32/dllcache is dated Aug5, the other two are dated June
19th.  As soon as I finish backing up a couple critical files I'm going
to use the recovery console to copy the $NTUninstall version back to
system32/dllcache and see if that helps.



Thus spake Ben Nelson (lists@...om600.org):

> Well, after installing the patches recommended by Windows Update my 
> machine won't boot.  It gives me a stop error complaining about an 
> inaccessible boot device.
> 
> Ruh-roh Microsoft......
> 
> Has anyone else seen this behavior?  Thank god I test all patches on a 
> disposable box before applying them elsewhere.
> 
> --Ben
> 
> Jerry Heidtke wrote:
> >Microsoft just issued 7 new security bulletins: 5 for various Windows
> >version and 2 for Exchange.
> >
> >Six are rated "critical", one is "important". Just to refresh your
> >memory, a critical vulnerability is one that can be exploited remotely
> >and automatically (such as by a worm) and gives complete system control.
> >An important vulnerability is one can be exploited remotely and gives
> >complete system control, but cannot be exploited automatically or
> >without some user action.
> >
> >Get patching.
> >
> >Confidentiality Notice: This e-mail message, including any attachments,
> >is for the sole use of the intended recipient(s) and may contain
> >confidential and privileged information.  Any unauthorized review, use,
> >disclosure or distribution is prohibited.  If you are not the intended
> >recipient, please contact the sender by reply e-mail and destroy all
> >copies of the original message.
> >
> >_______________________________________________
> >Full-Disclosure - We believe in it.
> >Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

:wq!
---------------------------------------------------------------------------
Robert L. Harris                     | GPG Key ID: E344DA3B
                                         @ x-hkp://pgp.mit.edu
DISCLAIMER:
      These are MY OPINIONS ALONE.  I speak for no-one else.

Life is not a destination, it's a journey.
  Microsoft produces 15 car pileups on the highway.
    Don't stop traffic to stand and gawk at the tragedy.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031015/0c893abe/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ