Title: Message
|
Sorry
about the HTML.
For
those admins that work with MS workstations:
![]() |
![]() |
![]() |
|
| |
![]() |
![]() |
|
September 10, 2003 This email is used
to communicate timely security advisory information, new and
upcoming product development initiatives, network security
threat alerts, and any other time-sensitive information from
eEye Digital Security.
We will do our best to provide
only very concise and straightforward information to stress
our consideration of your time and attention.
Alert: New Windows® RPC DCOM
Vulnerability Microsoft has announced today a critical
remote vulnerability in Windows RPC request handling.
Microsoft and eEye have released a detailed advisory to alert
and inform Windows users of the need to immediately remediate
vulnerable machines on their networks.
eEye Digital
Security Advisory http://www.eeye.com/html/Research/Advisories/AD20030910.html
Microsoft
Patch http://www.microsoft.com/technet/treeview/?url="">
Users
should note that this vulnerability differs from the
vulnerability publicized in Microsoft Bulletin MS03-026 found
here: http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
eEye Releases Updated Free RPC DCOM
Vulnerability Scanner eEye also announces the immediate
availability of a Retina® RPC Vulnerability Scanner to scan
for and detect this newly discovered RPC flaw. This tool is
based on eEye’s award-winning Retina® Network Security Scanner
and is being made available for free to assist IT
administrators in their efforts to quickly remediate this
vulnerability. http://www.eeye.com/html/Research/Tools/RPCDCOM.html
Retina
Network Security Scanner has also been updated to address this
newly discovered vulnerability. The RPC vulnerability testing
methodology utilized by both Retina and the RPC scanners are
non-intrusive and dramatically more accurate than other tools
currently available. http://www.eeye.com/html/Products/Retina/index.html
eEye Releases Updated RPC DCOM
Remediating Utility This special version of eEye's free
RPC DCOM Vulnerability Scanner dramatically enhances the
initial version by adding the capability to disinfect systems
throughout the network impacted by worms like Blaster (plus
its variants), Nachi, Teekids, and Penis32.
The Class C
version of the utility is free to all existing clients of
eEye. Class A, Class B and Class C versions of the utility are
available for purchase.
For additional information,
please visit: http://www.eeye.com/html/Research/Tools/RPCDCOM.html
SUBSCRIPTION INFORMATION
You are receiving
this email as a valued user of eEye products. If you wish to
be removed from the mailing list, please go to http://www.eeye.com/html/forms/unsubscribe.asp?list=Blast.
| |
| |
| |
|
--
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug