[<prev] [next>] [day] [month] [year] [list]
Message-ID: <EFEDB05BD6D3904BA5A595FB322BB4FF03EE0F@dnzakex1.datacom.co.nz>
From: StuartF at datacom.co.nz (Stuart Fox (DSL AK))
Subject: TCP Port 42 port scans? What the heck over...
This is potentially the patch:
http://www.microsoft.com/technet/security/bulletin/MS04-045.mspx
> -----Original Message-----
> From: full-disclosure-bounces@...ts.netsys.com
> [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf
> Of Florian Weimer
> Sent: Tuesday, 14 December 2004 9:54 a.m.
> To: James Lay
> Cc: Full-Disclosure (E-mail)
> Subject: Re: [Full-Disclosure] TCP Port 42 port scans? What
> the heck over...
>
> * James Lay:
>
> > Here they be. ODD. Anyone else seeing this?
>
> Probably yes. 8-) 42/TCP is used by Microsoft's WINS
> replication, and this service has got a security hole for
> which Microsoft has yet to release a patch.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists