• musclemecca bodybuilding forums does not sell or endorse any bodybuilding gear, products or supplements.
    Musclemecca has no affiliation with advertisers; they simply purchase advertising space here. If you have questions go to their site and ask them directly.
    Advertisers are responsible for the content in their forums.
    DO NOT SELL ILLEGAL PRODUCTS ON OUR FORUM

Microsoft posts emergency defence for new attack

P

Pain

............
VIP
Joined
Jun 27, 2006
Messages
7,562
Points
38
I was wondering what the update was when I turned on my pc this morning.

________________________________________
INTRODUCTION

News update responds to threat of Web worm

By Brian Livingston

We're publishing a special news update today to bring you a bulletin on a serious weakness in Windows.

Susan Bradley, our contributing editor who covers Microsoft patches, has written an up-to-the-minute description of the latest situation, which potentially affects every recent version of Windows.

I also might publish a special newsletter on Oct. 30. Windows Secrets wouldn't ordinarily post new content on that date, because we usually skip any 5th Thursday of the month. In the coming days, however, there may be enough detail about the latest flavor of Internet threats to warrant a special report.

News updates like the one today have no paid content. The same version is e-mailed to all subscribers, first to our paying supporters and then to our free subscribers.

Susan and I believe that the threat is serious enough for every Windows user to install the new MS patch without hesitation. This is the first time in 1½ years that Microsoft has released an emergency fix outside of its monthly Patch Tuesday cycle. See Susan's article for specific download links. We'll bring you more information as soon as we have it. Stay tuned.

Brian Livingston is editorial director of WindowsSecrets.com and co-author of Windows Vista Secrets and 10 other books.
Table of contents

________________________________________
PATCH WATCH

Microsoft posts emergency defense for new attack

By Susan Bradley

A remote-code exploit that could spread rapidly like the 2003 MSBlaster worm is putting all versions of Windows at risk.

I recommend that you immediately install a patch that Microsoft has just issued to protect your system from a vulnerability in the Server service.

MS08-067 (958644)
Rare out-of-cycle patch emphasizes the risk

With little warning, Microsoft released yesterday an unscheduled or "out-of-cycle" patch for a highly critical vulnerability that affects all versions of Windows. Security bulletin MS08-067 (patch 958644) was posted to warn of a remote-code attack that could spread wildly across the Internet.

Microsoft says it found evidence two weeks ago of an RPC (remote procedure call) attack that can potentially infect Windows machines across the Net with no user action required.

Windows Server 2003, 2000, and XP (even with Service Pack 2 or 3 installed) are particularly vulnerable. Vista and Server 2008 gain some protection via User Account Control, data-execution protection, and other safeguards, as explained in an article by Dan Goodin in the Register.

While firewalls are a first line of defense against this attack, don't think you're secure just because you have a firewall. Malware and viruses use many different techniques to wiggle their way into our systems.

For example, my office's networks are protected by firewalls on the outside, but inside the network, PCs have file and printer sharing enabled. If a worm got loose inside the office network (and the patch hadn't been installed), the attack would spread like wildfire.

Many antivirus vendors have already issued definition updates that protect against this attack. Your antivirus program, however, may not protect you completely even if your AV definitions are up-to-date. Early reports indicate that there are already nine different strains of viruses trying to take advantage of this vulnerability. We can expect more to come, so even the best AV application may not be able to update fast enough.

I've tested this patch and have had no problems applying it. I strongly urge you to download and install this patch manually. Restart your PC before installing any patch to verify that your machine is bootable. Then be sure to reboot again after installing the patch, so the patched binaries completely replace the vulnerable components.

Microsoft has posted several versions of the patch that apply to different operating systems:



More information: Please read security bulletin MS08-067. For an excellent technical explanation of the vulnerability and possible mitigations, read TechNet's Oct. 23 description. (TechNet incorrectly refers to MS08-067 as "out-of-band," but the patch is simply out-of-cycle, because it wasn't released on Microsoft's usual Patch Tuesday monthly cycle.)




The Patch Watch column reveals problems with patches for Windows and major Windows applications. Susan Bradley recently received an MVP (Most Valuable Professional) award from Microsoft for her knowledge in the areas of Small Business Server and network security. She's also a partner in a California CPA firm.
Table of contents
 

Similar threads

Ironslave
Replies
15
Views
4K
Hypocrisy86
Hypocrisy86
SiCK
Replies
56
Views
8K
Hypocrisy86
Hypocrisy86
P
Replies
6
Views
2K
tkD
tkD
Top