Sabtu, 11 April 2009

Microsoft New Patch Release - Ms09-001

Back earlier this year Microsoft released a patch with the latest code with the MS09-001

KB958687 patch file. Vulnerability by pacth that is not foreign anymore,

the problem that the network protocol, Microsoft Server Message Block (SMB).

Just remind, this hole has been closed many times by pacth

earlier, is the latest MS08-063. Is it difficult to close microsoft

meeting this hole?

Next on the glance patch MS09-001:

Target attack OS: Microsoft Windows XP, Server 200 - 2008 Why can happen:

SMP Protocol failed to validate the size of the buffer before the buffer

How do these actions attacker: attacker only to send a message to the PC network

Servers that run the service for victims Due: stop responding / hang up to

restart suggestions from Microsoft:



Minimalist port that is open, especially so that the target port 139 and 445,

but REMEMBER! This is done if the PC does not connect to the network because akan

impact on the other service is not running. Service will be subject to participate

closing the port page is: Applications that use SMB (CIFS) Applications

mailslots or that use named pipes commands (RPC over SMB) Server (File and Print Sharing) Group

PolicyNet logon Distributed File System (DFS) Terminal Server LicensingPrint

SpoolerComputer BrowserRemote Procedure Call LocatorFax ServiceIndexing

ServicePerformance Logs and Logging AlertsSystems Management ServerLicense

ServiceKonfigurasi inbound / outbound firewall in

So still and follow the development of the IT security world .. who else ...

Share/Save/Bookmark

0 komentar:

 

Join to the future © 2008 using D'Bluez Theme Designed by Ipiet Supported by Tadpole's Notez Based on FREEmium theme