http://blogs.pcmag.com/securitywatch/2010/02/rootkit_authors_issue_patch_fo.php
Since late last week, it has been reported that the machines which blue-screened after this MS update were found to have been infected with a root kit called "TDSS". This morning, I see a report that the authors of this root kit have developed a patch for it. So, rooted machines should all boot as "normal" now. -- Richard D. McClary Systems Administrator, Information Technology Group ASPCA® 1717 S. Philo Rd, Ste 36 Urbana, IL 61802 [email protected] P: 217-337-9761 C: 217-417-1182 F: 217-337-9761 www.aspca.org The information contained in this e-mail, and any attachments hereto, is from The American Society for the Prevention of Cruelty to Animals® (ASPCA ®) and is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution, copying or use of the contents of this e-mail, and any attachments hereto, is strictly prohibited. If you have received this e-mail in error, please immediately notify me by reply email and permanently delete the original and any copy of this e-mail and any printout thereof. "Christopher Bodnar" <[email protected]> wrote on 02/17/2010 07:52:41 AM: > Just talking about server OS here, not XP. > > We deployed this to our test systems last week (about 150 systems), > with no issues. Preparing for production this weekend, and with all > the talk about this patch, I just wanted to see if anyone did run > into issues with W2K3 systems. And if so, what was the scale? > > Thanks, > > > > Chris Bodnar, MCSE > Systems Engineer > Distributed Systems Service Delivery - Intel Services > Guardian Life Insurance Company of America > Email: [email protected] > Phone: 610-807-6459 > Fax: 610-807-6003 ----------------------------------------- This > message, and any attachments to it, may contain information that is > privileged, confidential, and exempt from disclosure under > applicable law. If the reader of this message is not the intended > recipient, you are notified that any use, dissemination, > distribution, copying, or communication of this message is strictly > prohibited. If you have received this message in error, please > notify the sender immediately by return e-mail and delete the > message and any attachments. Thank you. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
