Log in

No account? Create an account

Previous Entry | Next Entry

MS Patch

For those of you running Microsoft operating systems, please read on.

I am putting out a personal plea to everyone to apply MS03-026 to your machines as soon as possible. This patch fixes a Remote Procedure Call (RPC) vulnerability. This function allows for various network related services. A buffer overrun exists which allows attacker code to be run in the system context, where even an administrator can not stop the process. Exploit code for this vulnerability was available shortly after this was announced, though it originally required manual intervention to execute. Since then, a major virus (WORM_MSBLAST.A) which uses this vulnerability has spread on the Internet. Anti-virus is only one layer of protection, and is reactive in nature. The long term solution to preventing this from running is to apply this critical patch.

So do yourself and your fellow netizens a favor and update your systems.


( 9 comments — Leave a comment )
Aug. 12th, 2003 10:16 am (UTC)
If I remember correctly, that's for windows ME and above; the notice we got from my ISP didn't include W98 and below.
Aug. 12th, 2003 10:20 am (UTC)
Actually, it doesn't include the Win9x systems at all -- just Windows NT, 2000, and XP.
Aug. 12th, 2003 02:50 pm (UTC)
Well crap. I hate installing important stuff like that. I'm always so afraid I'm going to do something wrong and ruin my computer :(
Aug. 12th, 2003 02:58 pm (UTC)
This patch has been out for three weeks. It's tested from Microsoft, and the millions of millions of people (like me) that have run it.

You are going to say a prayer before installing, right? =)
Aug. 12th, 2003 03:23 pm (UTC)
whew, that was easy!
Aug. 12th, 2003 02:53 pm (UTC)
Uhhh....how do I know if I have an XP 32 bit edition or an XP 64 bit edition?
Aug. 12th, 2003 02:59 pm (UTC)
You've got 32-bit.
Aug. 12th, 2003 10:28 pm (UTC)
I have just installed the patch. Thanks for the warning!
Aug. 13th, 2003 10:27 pm (UTC)
No problem.
( 9 comments — Leave a comment )