lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0EBC45FCABFC95428EBFC3A51B368C95513944@jessica.herefordshire.gov.uk>
From: prandal at herefordshire.gov.uk (Randal, Phil)
Subject: New Microsoft security bulletins today

Shouldn't the basesrv.dll end up in c:\winnt\system32 as well?

Can the folks who are having this trouble tell us what OS version and
Service pack level they're on?

Cheers,

Phil

---------------------------------------------
Phil Randal
Network Engineer
Herefordshire Council
Hereford, UK 

> -----Original Message-----
> From: Robert L. Harris [mailto:Robert.L.Harris@...g.net]
> Sent: 16 October 2003 01:43
> To: Ben Nelson
> Cc: full-disclosure; Jerry Heidtke
> Subject: Re: [Full-Disclosure] New Microsoft security bulletins today
> 
> 
> 
> 
> Yes, I got the same.  Somethings I found though:
> 
> It's complaining about "basesrv" a dynamicly linked library.  
> I rebooted
> into Linux and ran some finds and found 3 files:
> 
> WINNT/$NtUninstallKB824141$/basesrv.dll
> WINNT/ServicePackFiles/i386/basesrv.dll
> WINNT/system32/dllcache/BASESRV.DLL
> 
> the one in system32/dllcache is dated Aug5, the other two are 
> dated June
> 19th.  As soon as I finish backing up a couple critical files 
> I'm going
> to use the recovery console to copy the $NTUninstall version back to
> system32/dllcache and see if that helps.
> 
> 
> 
> Thus spake Ben Nelson (lists@...om600.org):
> 
> > Well, after installing the patches recommended by Windows Update my 
> > machine won't boot.  It gives me a stop error complaining about an 
> > inaccessible boot device.
> > 
> > Ruh-roh Microsoft......
> > 
> > Has anyone else seen this behavior?  Thank god I test all 
> patches on a 
> > disposable box before applying them elsewhere.
> > 
> > --Ben
> > 
> > Jerry Heidtke wrote:
> > >Microsoft just issued 7 new security bulletins: 5 for 
> various Windows
> > >version and 2 for Exchange.
> > >
> > >Six are rated "critical", one is "important". Just to refresh your
> > >memory, a critical vulnerability is one that can be 
> exploited remotely
> > >and automatically (such as by a worm) and gives complete 
> system control.
> > >An important vulnerability is one can be exploited 
> remotely and gives
> > >complete system control, but cannot be exploited automatically or
> > >without some user action.
> > >
> > >Get patching.
> > >
> > >Confidentiality Notice: This e-mail message, including any 
> attachments,
> > >is for the sole use of the intended recipient(s) and may contain
> > >confidential and privileged information.  Any unauthorized 
> review, use,
> > >disclosure or distribution is prohibited.  If you are not 
> the intended
> > >recipient, please contact the sender by reply e-mail and 
> destroy all
> > >copies of the original message.
> > >
> > >_______________________________________________
> > >Full-Disclosure - We believe in it.
> > >Charter: http://lists.netsys.com/full-disclosure-charter.html
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> :wq!
> --------------------------------------------------------------
> -------------
> Robert L. Harris                     | GPG Key ID: E344DA3B
>                                          @ x-hkp://pgp.mit.edu
> DISCLAIMER:
>       These are MY OPINIONS ALONE.  I speak for no-one else.
> 
> Life is not a destination, it's a journey.
>   Microsoft produces 15 car pileups on the highway.
>     Don't stop traffic to stand and gawk at the tragedy.
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ