[INFO] DE/JHF - Reenvio " Más Madera ésto es la..... "

11/09/2003 - 01:33 por Jesus Hernandez | Informe spam
NOTA: Windows ME y Windows 9.x no están afectados por este nuevo agujero.




De: "Jerry Bryant [MSFT]" <jbryant@online.microsoft.com>
Asunto: Microsoft Security Bulletin MS03-039 -
Fecha: miércoles, 10 de septiembre de 2003 18:24

Please note: Windows ME and Windows 9.x systems are not affected by this!

Title: Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
Date: September 10, 2003
Software: Microsoft Windows NT Workstation 4.0; Microsoft Windows NT Server 4.0; Microsoft
Windows NT Server 4.0, Terminal Server Edition; Microsoft Windows 2000; Microsoft Windows
XP; Microsoft Windows Server 2003
Impact: Run code of attackers choice
Maximum Severity Rating: Critical
Bulletin: MS03-039

The Microsoft Security Response Center has released Microsoft Security Bulletin MS03-039

What Is It?
The Microsoft Security Response Center has released Microsoft Security Bulletin MS03-039
which concerns a vulnerability in the versions of Microsoft Windows listed above.

Microsoft has released a tool that can be used to scan a network for the presence of
systems which have not had the MS03-039 patch installed. More details on this tool are
available in Microsoft Knowledge Base article 827363. This tool supersedes the one
provided in Microsoft Knowledge Base article 826369 which was developed to scan systems
for the vulnerability patched by MS03-026.

More information is now available at
http://www.microsoft.com/technet/se...03-039.asp

In an effort to better communicate with our customers, Microsoft will also be conducting a
Webcast to provide guidance on Protecting Your PC and details of MS03-039.
http://www.microsoft.com/usa/webcas...g/2373.asp

If you have any questions regarding the patch or its implementation after reading the
above listed bulletin you should contact Product Support Services in the United States at
1-866-PCSafety (1-866-727-2338). International customers should contact their local
subsidiary.


Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and confers no rights.
 

Leer las respuestas

#1 kabus
11/09/2003 - 09:51 | Informe spam
¡Hola jesus!

¿Que es eso de agujero? nos podrías dar su nombre y como
se puede evitar, por favor.

Un saludo,Kabus
NOTA: Windows ME y Windows 9.x no están afectados por


este nuevo agujero.




De: "Jerry Bryant [MSFT]"
Asunto: Microsoft Security Bulletin MS03-039 -
Fecha: miércoles, 10 de septiembre de 2003 18:24

Please note: Windows ME and Windows 9.x systems are not


affected by this!

Title: Buffer Overrun In RPCSS Service Could Allow Code


Execution (824146)
Date: September 10, 2003
Software: Microsoft Windows NT Workstation 4.0; Microsoft


Windows NT Server 4.0; Microsoft
Windows NT Server 4.0, Terminal Server Edition; Microsoft


Windows 2000; Microsoft Windows
XP; Microsoft Windows Server 2003
Impact: Run code of attackers choice
Maximum Severity Rating: Critical
Bulletin: MS03-039

The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039

What Is It?
The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039
which concerns a vulnerability in the versions of


Microsoft Windows listed above.

Microsoft has released a tool that can be used to scan a


network for the presence of
systems which have not had the MS03-039 patch installed.


More details on this tool are
available in Microsoft Knowledge Base article 827363.


This tool supersedes the one
provided in Microsoft Knowledge Base article 826369 which


was developed to scan systems
for the vulnerability patched by MS03-026.

More information is now available at
http://www.microsoft.com/technet/se...etin/MS03-


039.asp

In an effort to better communicate with our customers,


Microsoft will also be conducting a
Webcast to provide guidance on Protecting Your PC and


details of MS03-039.
http://www.microsoft.com/usa/webcas...g/2373.asp

If you have any questions regarding the patch or its


implementation after reading the
above listed bulletin you should contact Product Support


Services in the United States at
1-866-PCSafety (1-866-727-2338). International customers


should contact their local
subsidiary.


Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and


confers no rights.





.

Preguntas similares