OMRF-ISG Archives

OMRF's Information Support Group

omrf-isg@SPEEDY.OUHSC.EDU

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0 (Apple Message framework v612)
Content-Type:
text/plain; charset=US-ASCII; format=flowed
Date:
Wed, 11 Feb 2004 08:27:21 -0600
Reply-To:
OMRF's Information Support Group <[log in to unmask]>
Subject:
From:
Quyen Arana <[log in to unmask]>
In-Reply-To:
Content-Transfer-Encoding:
7bit
Sender:
OMRF's Information Support Group <[log in to unmask]>
Parts/Attachments:
text/plain (25 lines)
Big mitigating factor:

"An attacker must have valid logon credentials to exploit the
vulnerability. The vulnerability could not be exploited remotely
without a valid user account."


On Feb 10, 2004, at 7:24 PM, Todd Walker wrote:

> http://www.microsoft.com/technet/treeview/?url=/technet/security/
> bulletin/MS04-007.asp
>
> This hopefully should lead you directly to the right patch.  No one
> make fun of me here -
> I'm only trying to save work for myself by helping everything get
> patched before the
> new worm hits...
>
>
J Quyen Arana
Information Technology Director
Oklahoma Science Project
[log in to unmask]
405.271.7683

ATOM RSS1 RSS2