Use this link to d/l the appropriate version for your OS or just use Windows
Update.

http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

Using a firewall, either hardware or software, will help mitigate the spread
of the exploit.

http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.a
spx
________________________________________

http://windowssecrets.com/comp/081024

INTRODUCTION 

News update responds to threat of Web worm 

By Brian Livingston 

We're publishing a special news update today to bring you a bulletin on a
serious weakness in Windows.

Susan Bradley, our contributing editor who covers Microsoft patches, has
written an up-to-the-minute description of the latest situation, which
potentially affects every recent version of Windows.

I also might publish a special newsletter on Oct. 30. Windows Secrets
wouldn't ordinarily post new content on that date, because we usually skip
any 5th Thursday of the month. In the coming days, however, there may be
enough detail about the latest flavor of Internet threats to warrant a
special report.

News updates like the one today have no paid content. The same version is
e-mailed to all subscribers, first to our paying supporters and then to our
free subscribers.

Susan and I believe that the threat is serious enough for every Windows user
to install the new MS patch without hesitation. This is the first time in 1½
years that Microsoft has released an emergency fix outside of its monthly
Patch Tuesday cycle. See Susan's article for specific download links. We'll
bring you more information as soon as we have it. Stay tuned.

Brian Livingston is editorial director of WindowsSecrets.com and co-author
of Windows Vista Secrets and 10 other books.
   
________________________________________
PATCH WATCH 

Microsoft posts emergency defense for new attack 

By Susan Bradley

A remote-code exploit that could spread rapidly like the 2003 MSBlaster worm
is putting all versions of Windows at risk.

I recommend that you immediately install a patch that Microsoft has just
issued to protect your system from a vulnerability in the Server service.

MS08-067 (958644) 
Rare out-of-cycle patch emphasizes the risk 

With little warning, Microsoft released yesterday an unscheduled or
"out-of-cycle" patch for a highly critical vulnerability that affects all
versions of Windows. Security bulletin MS08-067 (patch 958644) was posted to
warn of a remote-code attack that could spread wildly across the Internet.

Microsoft says it found evidence two weeks ago of an RPC (remote procedure
call) attack that can potentially infect Windows machines across the Net
with no user action required.

Windows Server 2003, 2000, and XP (even with Service Pack 2 or 3 installed)
are particularly vulnerable. Vista and Server 2008 gain some protection via
User Account Control, data-execution protection, and other safeguards, as
explained in an article by Dan Goodin in the Register.

While firewalls are a first line of defense against this attack, don't think
you're secure just because you have a firewall. Malware and viruses use many
different techniques to wiggle their way into our systems.

For example, my office's networks are protected by firewalls on the outside,
but inside the network, PCs have file and printer sharing enabled. If a worm
got loose inside the office network (and the patch hadn't been installed),
the attack would spread like wildfire.

Many antivirus vendors have already issued definition updates that protect
against this attack. Your antivirus program, however, may not protect you
completely even if your AV definitions are up-to-date. Early reports
indicate that there are already nine different strains of viruses trying to
take advantage of this vulnerability. We can expect more to come, so even
the best AV application may not be able to update fast enough.

I've tested this patch and have had no problems applying it. I strongly urge
you to download and install this patch manually. Restart your PC before
installing any patch to verify that your machine is bootable. Then be sure
to reboot again after installing the patch, so the patched binaries
completely replace the vulnerable components.

Microsoft has posted several versions of the patch that apply to different
operating systems:

• Windows 2000 with Service Pack 4 patch download 
• Windows XP with Service Pack 2 or 3 patch download
• Windows XP 64-bit Edition patch download
• Windows Server 2003 with Service Pack 1 or 2 patch download
• Windows Server 2003 64-bit Edition patch download
• Windows Vista with or without Service Pack 1 patch download
• Windows Vista 64-bit Edition with or without Service Pack 1 patch download
• Windows Server 2008 32-bit Edition patch download
• Windows Server 2008 64-bit Edition patch download

More information: Please read security bulletin MS08-067. For an excellent
technical explanation of the vulnerability and possible mitigations, read
TechNet's Oct. 23 description. (TechNet incorrectly refers to MS08-067 as
"out-of-band," but the patch is simply out-of-cycle, because it wasn't
released on Microsoft's usual Patch Tuesday monthly cycle.)

The Patch Watch column reveals problems with patches for Windows and major
Windows applications. Susan Bradley recently received an MVP (Most Valuable
Professional) award from Microsoft for her knowledge in the areas of Small
Business Server and network security. She's also a partner in a California
CPA firm.
Table of contents


*************************************************************************
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*************************************************************************

Reply via email to