Tick... tick... tick...
Jul. 28th, 2003 11:44 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Attacks using the new RPC/DCOM hole are picking up in frequency and volume. So much, one Uni says they will start pulling vulnerable systems from their net. Not COMPROMISED systems... VULNERABLE systems. I.e., "Oh, you didn't patch this week? No worry. We'll just undo your network connection RIGHT HERE [*CRUNCH*]...."
Small wonder, though. There's exploits out in source, one with a menu so you don't even have to think about the target system offset value. Heck, there's a precompiled Windows32 app version of the 'sploit. Point and drool system breakin. It's like a feeding frenzy; h4x0r r10t0Rz l00T1n.
Wonder what I'm talking about? Ok, here's an easy way to tell if your system is open to the vulnerability announced in MS03-026:
Q: Running Windows NT4, 2000, XP, or 2003?
a) No? Not vulnerable.
b) Yes? It's vulnerable...
...unless you patched recently specifically for the hole, or you're running personal firewall software (in which case, your box still has the hole, but is reasonably protected if the FW is set up correctly).
Oh, MS suggested a "workaround" -- turn off DCOM, a "workaround" that breaks Acrobat, Excel, and many other applications. "Gee, Thanks!"
Wonder what I'm talking about?
Run dcomcnfg (Start->Run->dcomcnfg)
Click "no" a couple times.
Looooook at that list of software you might break by turning off DCOM. "Gosh, great suggestion, Microsoft!"
Alternatively, unplug affected system, and bury head in sand. Hum loudly.
Small wonder, though. There's exploits out in source, one with a menu so you don't even have to think about the target system offset value. Heck, there's a precompiled Windows32 app version of the 'sploit. Point and drool system breakin. It's like a feeding frenzy; h4x0r r10t0Rz l00T1n.
Wonder what I'm talking about? Ok, here's an easy way to tell if your system is open to the vulnerability announced in MS03-026:
Q: Running Windows NT4, 2000, XP, or 2003?
a) No? Not vulnerable.
b) Yes? It's vulnerable...
...unless you patched recently specifically for the hole, or you're running personal firewall software (in which case, your box still has the hole, but is reasonably protected if the FW is set up correctly).
Oh, MS suggested a "workaround" -- turn off DCOM, a "workaround" that breaks Acrobat, Excel, and many other applications. "Gee, Thanks!"
Wonder what I'm talking about?
Run dcomcnfg (Start->Run->dcomcnfg)
Click "no" a couple times.
Looooook at that list of software you might break by turning off DCOM. "Gosh, great suggestion, Microsoft!"
Alternatively, unplug affected system, and bury head in sand. Hum loudly.
(no subject)
Date: 2003-08-02 01:53 am (UTC)(No I don't use it for printing so it's bloated crapware for me, and I will not install it. If I need the info out of it and I can't get it out, I run pdf2html on it and blammo, I have usable document, much smaller.)
(no subject)
Date: 2003-08-02 08:35 am (UTC)Pretty painful. I suppose it helps with portability or ensures long-term employment, or something.
(no subject)
Date: 2003-08-02 08:58 am (UTC)