RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-15 Thread Ken Schaefer
...@lists.myitforum.com] On Behalf Of Richard Stovall Sent: Friday, 14 November 2014 1:35 PM To: ntsysadm@lists.myitforum.com Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability Well, TMG is Windows, right? Personally, out of an abundance of caution, I would assume the TMG server itself

RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-14 Thread Ed Ziots
about web machines behind say, TMG? *From:* listsad...@lists.myitforum.com [mailto: listsad...@lists.myitforum.com] *On Behalf Of *Andrew S. Baker *Sent:* Wednesday, November 12, 2014 5:57 PM *To:* ntsysadm *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability There's

Re: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-13 Thread Ed Ziots
Actually there is a code snippet on paste in about this and there is development going on with exploits so honestly on this on patch now. Ez On Nov 12, 2014 8:59 PM, Andrew S. Baker asbz...@gmail.com wrote: There's nothing in the wild *as yet*, but given the wormable potential, I would expect

RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-13 Thread Heaton, Joseph@Wildlife
What about web machines behind say, TMG? From: listsad...@lists.myitforum.com [mailto:listsad...@lists.myitforum.com] On Behalf Of Andrew S. Baker Sent: Wednesday, November 12, 2014 5:57 PM To: ntsysadm Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability There's nothing in the wild

Re: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-13 Thread Richard Stovall
: What about web machines behind say, TMG? *From:* listsad...@lists.myitforum.com [mailto: listsad...@lists.myitforum.com] *On Behalf Of *Andrew S. Baker *Sent:* Wednesday, November 12, 2014 5:57 PM *To:* ntsysadm *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability There's

[NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread geoff taylor
Looking for opinions on how urgent this is, and your plan of attack. No shortage of people crying Wolf. As usual SANs is balanced and sane recognizing the possible severe implications and yet acknowledging that a well thought out patching approach (expedited perhaps) is the best defense.

RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Matthew Topper
...@lists.myitforum.com] On Behalf Of geoff taylor Sent: Wednesday, November 12, 2014 3:06 PM To: ntsysadm@lists.myitforum.com Subject: [NTSysADM] MS14-066 - secure channel vulnerability Looking for opinions on how urgent this is, and your plan of attack. No shortage of people crying Wolf. As usual SANs is balanced

Re: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Richard Stovall
scheduled maintenance windows. Matthew Topper *From:* listsad...@lists.myitforum.com [mailto: listsad...@lists.myitforum.com] *On Behalf Of *geoff taylor *Sent:* Wednesday, November 12, 2014 3:06 PM *To:* ntsysadm@lists.myitforum.com *Subject:* [NTSysADM] MS14-066 - secure channel

RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Matthew Topper
12, 2014 3:16 PM To: ntsysadm@lists.myitforum.com Subject: Re: [NTSysADM] MS14-066 - secure channel vulnerability Was a reboot required when you did it? On Wed, Nov 12, 2014 at 3:11 PM, Matthew Topper mtop...@capstoneitinc.commailto:mtop...@capstoneitinc.com wrote: I’ve applied the patch

RE: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Richard Stovall
...@lists.myitforum.com [mailto: listsad...@lists.myitforum.com] *On Behalf Of *Richard Stovall *Sent:* Wednesday, November 12, 2014 3:16 PM *To:* ntsysadm@lists.myitforum.com *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability Was a reboot required when you did it? On Wed, Nov 12, 2014

Re: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Andrew S. Baker
There's nothing in the wild *as yet*, but given the wormable potential, I would expect exploit code within 4-6 business days. Patch perimeter exposed systems as soon as you can, and work from there. Be advised that if a client system gets hit, it will be able to hit all the systems that it has

Re: [NTSysADM] MS14-066 - secure channel vulnerability

2014-11-12 Thread Richard Stovall
Patching public-facing systems now... Grrr. On Wed, Nov 12, 2014 at 8:56 PM, Andrew S. Baker asbz...@gmail.com wrote: There's nothing in the wild *as yet*, but given the wormable potential, I would expect exploit code within 4-6 business days. Patch perimeter exposed systems as soon as