Does anyone have a list of the most common applications that rely on DCOM to function? I'm contemplating issuing a GPO edict to disable DCOM as described in KB 825750, but before I do that I want to know what nightmare I'm unleashing upon myself.
Roger -------------------------------------------------------------- Roger D. Seielstad - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc. > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > Sent: Monday, August 11, 2003 9:03 PM > To: NT 2000 Discussions > Subject: DCOM RPC vulnerabilities / MS Blaster worm > > > > For convenience, I have collected information about the > CAN-2003-0352 and > CAN-2003-0605 vulnerabilities, and the "MS Blaster" worm, here: > http://www.ntisys.com/bulletins/MS-DCOM-exploits.html Please note that there are *TWO* separate but similar vulnerabilities, that both appear to be being attacked (although to what degree is uncertain), and only *ONE* has been patched by Microsoft. -- Ben Scott <[EMAIL PROTECTED]> | The opinions expressed in this message are those of the author and do | | not represent the views or policy of any other person or organization. | | All information is provided without warranty of any kind. | ------ You are subscribed as [EMAIL PROTECTED] Web Interface: http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=nt2000&text_mode=&lang=e nglish To unsubscribe send a blank email to %%email.unsub%% ------ You are subscribed as [EMAIL PROTECTED] Web Interface: http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=nt2000&text_mode=&lang=english To unsubscribe send a blank email to [EMAIL PROTECTED]
