Back earlier this year Microsoft released a patch with the latest code with the MS09-001
KB958687 patch file. Vulnerability by pacth that is not foreign anymore,
the problem that the network protocol, Microsoft Server Message Block (SMB).
Just remind, this hole has been closed many times by pacth
earlier, is the latest MS08-063. Is it difficult to close microsoft
meeting this hole?
Next on the glance patch MS09-001:
Target attack OS: Microsoft Windows XP, Server 200 - 2008 Why can happen:
SMP Protocol failed to validate the size of the buffer before the buffer
How do these actions attacker: attacker only to send a message to the PC network
Servers that run the service for victims Due: stop responding / hang up to
restart suggestions from Microsoft:
Minimalist port that is open, especially so that the target port 139 and 445,
but REMEMBER! This is done if the PC does not connect to the network because akan
impact on the other service is not running. Service will be subject to participate
closing the port page is: Applications that use SMB (CIFS) Applications
mailslots or that use named pipes commands (RPC over SMB) Server (File and Print Sharing) Group
PolicyNet logon Distributed File System (DFS) Terminal Server LicensingPrint
SpoolerComputer BrowserRemote Procedure Call LocatorFax ServiceIndexing
ServicePerformance Logs and Logging AlertsSystems Management ServerLicense
ServiceKonfigurasi inbound / outbound firewall in
So still and follow the development of the IT security world .. who else ...
Sabtu, 11 April 2009
Langganan:
Posting Komentar (Atom)
0 komentar: