OMRF-ISG Archives

OMRF's Information Support Group

omrf-isg@SPEEDY.OUHSC.EDU

Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0 (Apple Message framework v552)
Content-Type:
text/plain; charset=US-ASCII; format=flowed
Date:
Fri, 15 Aug 2003 10:15:31 -0500
Reply-To:
OMRF's Information Support Group <[log in to unmask]>
Subject:
From:
Todd Walker <[log in to unmask]>
Content-Transfer-Encoding:
7bit
Sender:
OMRF's Information Support Group <[log in to unmask]>
Comments:
cc: [log in to unmask], Brad Pazoureck <[log in to unmask]>, Jon Hamm <[log in to unmask]>, Les Cummings <[log in to unmask]>
Parts/Attachments:
text/plain (13 lines)
It's unlikely this affects anyone, but better safe than sorry.  It
turns out that if you have Win2k Service Pack 1 or 2, and used
MS's "workaround," posted at the same time as the July patch
for the RPC vulnerability, this workaround doesn't work.  It's
only relevant if you had a Win2k SP1 or SP2 computer on which
you disabled DCOM instead of applying the patch; if you applied
the patch (before being infected of course)  you are OK...




http://www.pcworld.com/news/article/0,aid,112006,00.asp

ATOM RSS1 RSS2