Is the endpoint is open the vulnerability is there it can be exploited with specially crafted packets to gain system level privy therefore this could be a nasty one when exploit code comes available.
Ed On Nov 13, 2014 7:21 PM, "Heaton, Joseph@Wildlife" < [email protected]> wrote: > What about web machines behind say, TMG? > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Andrew S. Baker > *Sent:* Wednesday, November 12, 2014 5:57 PM > *To:* ntsysadm > *Subject:* Re: [NTSysADM] MS14-066 - secure channel vulnerability > > > > There's nothing in the wild *as yet*, but given the wormable potential, I > would expect exploit code within 4-6 business days. > > > > Patch perimeter exposed systems as soon as you can, and work from there. > > > > Be advised that if a client system gets hit, it will be able to hit all > the systems that it has access to within your network. > > > > Regards, > > > > > > > > *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker> > *Providing Virtual CIO Services (IT Operations & Information Security) for > the SMB market…* > > > > > > On Wed, Nov 12, 2014 at 3:06 PM, geoff taylor <[email protected]> > wrote: > > Looking for opinions on how urgent this is, and your plan of attack. > No shortage of people crying Wolf. As usual SANs is balanced and sane > recognizing the possible severe implications and yet acknowledging that a > well thought out patching approach (expedited perhaps) is the best defense. > > > > *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> * > gt > > >

