OMRF-ISG Archives

OMRF's Information Support Group

omrf-isg@SPEEDY.OUHSC.EDU

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Todd Walker <[log in to unmask]>
Reply To:
OMRF's Information Support Group <[log in to unmask]>
Date:
Fri, 15 Aug 2003 10:15:31 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (13 lines)
It's unlikely this affects anyone, but better safe than sorry.  It
turns out that if you have Win2k Service Pack 1 or 2, and used
MS's "workaround," posted at the same time as the July patch
for the RPC vulnerability, this workaround doesn't work.  It's
only relevant if you had a Win2k SP1 or SP2 computer on which
you disabled DCOM instead of applying the patch; if you applied
the patch (before being infected of course)  you are OK...




http://www.pcworld.com/news/article/0,aid,112006,00.asp

ATOM RSS1 RSS2