...@lists.myitforum.com] On
Behalf Of Richard Stovall
Sent: Friday, 14 November 2014 1:35 PM
To: ntsysadm@lists.myitforum.com
Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability
Well, TMG is Windows, right? Personally, out of an abundance of caution, I
would assume the TMG server itself
about web machines behind say, TMG?
*From:* listsad...@lists.myitforum.com [mailto:
listsad...@lists.myitforum.com] *On Behalf Of *Andrew S. Baker
*Sent:* Wednesday, November 12, 2014 5:57 PM
*To:* ntsysadm
*Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability
There's
Actually there is a code snippet on paste in about this and there is
development going on with exploits so honestly on this on patch now.
Ez
On Nov 12, 2014 8:59 PM, Andrew S. Baker asbz...@gmail.com wrote:
There's nothing in the wild *as yet*, but given the wormable potential, I
would expect
What about web machines behind say, TMG?
From: listsad...@lists.myitforum.com [mailto:listsad...@lists.myitforum.com] On
Behalf Of Andrew S. Baker
Sent: Wednesday, November 12, 2014 5:57 PM
To: ntsysadm
Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability
There's nothing in the wild
:
What about web machines behind say, TMG?
*From:* listsad...@lists.myitforum.com [mailto:
listsad...@lists.myitforum.com] *On Behalf Of *Andrew S. Baker
*Sent:* Wednesday, November 12, 2014 5:57 PM
*To:* ntsysadm
*Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability
There's
Looking for opinions on how urgent this is, and your plan of attack.
No shortage of people crying Wolf. As usual SANs is balanced and sane
recognizing the possible severe implications and yet acknowledging that
a well thought out patching approach (expedited perhaps) is the best
defense.
...@lists.myitforum.com] On
Behalf Of geoff taylor
Sent: Wednesday, November 12, 2014 3:06 PM
To: ntsysadm@lists.myitforum.com
Subject: [NTSysADM] MS14-066 - secure channel vulnerability
Looking for opinions on how urgent this is, and your plan of attack.
No shortage of people crying Wolf. As usual SANs is balanced
scheduled maintenance windows.
Matthew Topper
*From:* listsad...@lists.myitforum.com [mailto:
listsad...@lists.myitforum.com] *On Behalf Of *geoff taylor
*Sent:* Wednesday, November 12, 2014 3:06 PM
*To:* ntsysadm@lists.myitforum.com
*Subject:* [NTSysADM] MS14-066 - secure channel
12, 2014 3:16 PM
To: ntsysadm@lists.myitforum.com
Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability
Was a reboot required when you did it?
On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper
mtop...@capstoneitinc.commailto:mtop...@capstoneitinc.com wrote:
I’ve applied the patch
...@lists.myitforum.com [mailto:
listsad...@lists.myitforum.com] *On Behalf Of *Richard Stovall
*Sent:* Wednesday, November 12, 2014 3:16 PM
*To:* ntsysadm@lists.myitforum.com
*Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability
Was a reboot required when you did it?
On Wed, Nov 12, 2014
There's nothing in the wild *as yet*, but given the wormable potential, I
would expect exploit code within 4-6 business days.
Patch perimeter exposed systems as soon as you can, and work from there.
Be advised that if a client system gets hit, it will be able to hit all the
systems that it has
Patching public-facing systems now...
Grrr.
On Wed, Nov 12, 2014 at 8:56 PM, Andrew S. Baker asbz...@gmail.com wrote:
There's nothing in the wild *as yet*, but given the wormable potential, I
would expect exploit code within 4-6 business days.
Patch perimeter exposed systems as soon as
12 matches
Mail list logo