Skip Navigational Links
LISTSERV email list manager
LISTSERV - LISTS.OU.EDU
LISTSERV Menu
Log In
Log In
LISTSERV 17.5 Help - OMRF-ISG Archives
LISTSERV Archives
LISTSERV Archives
Search Archives
Search Archives
Register
Register
Log In
Log In

OMRF-ISG Archives

OMRF's Information Support Group

omrf-isg@SPEEDY.OUHSC.EDU

Menu
LISTSERV Archives LISTSERV Archives
OMRF-ISG Home OMRF-ISG Home

Log In Log In
Register Register

Subscribe or Unsubscribe Subscribe or Unsubscribe

Search Archives Search Archives
Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0 (Apple Message framework v552)
Content-Type:
text/plain; charset=US-ASCII; format=flowed
Date:
Fri, 15 Aug 2003 10:15:31 -0500
Reply-To:
OMRF's Information Support Group <[log in to unmask]>
Subject:
FYI: MS workaround for RPC patch does not work
From:
Todd Walker <[log in to unmask]>
Content-Transfer-Encoding:
7bit
Sender:
OMRF's Information Support Group <[log in to unmask]>
Comments:
cc: [log in to unmask], Brad Pazoureck <[log in to unmask]>, Jon Hamm <[log in to unmask]>, Les Cummings <[log in to unmask]>
Parts/Attachments:
text/plain (13 lines)
It's unlikely this affects anyone, but better safe than sorry.  It
turns out that if you have Win2k Service Pack 1 or 2, and used
MS's "workaround," posted at the same time as the July patch
for the RPC vulnerability, this workaround doesn't work.  It's
only relevant if you had a Win2k SP1 or SP2 computer on which
you disabled DCOM instead of applying the patch; if you applied
the patch (before being infected of course)  you are OK...




http://www.pcworld.com/news/article/0,aid,112006,00.asp

ATOM RSS1 RSS2

LISTS.OU.EDU CataList Email List Search Powered by LISTSERV