OMRF-ISG Archives

OMRF's Information Support Group

omrf-isg@SPEEDY.OUHSC.EDU

Options: Use Classic View

Use Monospaced Font
Show HTML Part by Default
Condense Mail Headers

Topic: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version: 1.0 (Apple Message framework v552)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Date: Fri, 15 Aug 2003 10:15:31 -0500
Reply-To: OMRF's Information Support Group <[log in to unmask]>
From: Todd Walker <[log in to unmask]>
Content-Transfer-Encoding: 7bit
Sender: OMRF's Information Support Group <[log in to unmask]>
Comments: cc: [log in to unmask], Brad Pazoureck <[log in to unmask]>, Jon Hamm <[log in to unmask]>, Les Cummings <[log in to unmask]>
Parts/Attachments: text/plain (13 lines)
It's unlikely this affects anyone, but better safe than sorry.  It
turns out that if you have Win2k Service Pack 1 or 2, and used
MS's "workaround," posted at the same time as the July patch
for the RPC vulnerability, this workaround doesn't work.  It's
only relevant if you had a Win2k SP1 or SP2 computer on which
you disabled DCOM instead of applying the patch; if you applied
the patch (before being infected of course)  you are OK...




http://www.pcworld.com/news/article/0,aid,112006,00.asp

ATOM RSS1 RSS2