Does anyone have a list of the most common applications that rely on DCOM to
function? I'm contemplating issuing a GPO edict to disable DCOM as described
in KB 825750, but before I do that I want to know what nightmare I'm
unleashing upon myself.

Roger
--------------------------------------------------------------
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.


> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> Sent: Monday, August 11, 2003 9:03 PM
> To: NT 2000 Discussions
> Subject: DCOM RPC vulnerabilities / MS Blaster worm
> 
> 
> 
>   For convenience, I have collected information about the 
> CAN-2003-0352 and
> CAN-2003-0605 vulnerabilities, and the "MS Blaster" worm, here:
> 
http://www.ntisys.com/bulletins/MS-DCOM-exploits.html

  Please note that there are *TWO* separate but similar vulnerabilities,
that both appear to be being attacked (although to what degree is
uncertain), and only *ONE* has been patched by Microsoft.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.              |



------
You are subscribed as [EMAIL PROTECTED]
Web Interface:
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=nt2000&text_mode=&lang=e
nglish
To unsubscribe send a blank email to %%email.unsub%%

------
You are subscribed as [EMAIL PROTECTED]
Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=nt2000&text_mode=&lang=english
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to