Originally posted by: SaigonK
Originally posted by: NogginBoink
Before this thread gets out of hand: I have contacts in the security group at Microsoft. I am finding out if MS04-011 protects against this from the horse's moth. I suspect that MS04-011 does protect against this, since MS04-011 does include a patch for an lsass vulnerability.
I checked with my Microsoft sources, 04-011 is made to fight this exploit.
http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx
Patch your machines..you should be all set.
Originally posted by: SaigonK
Fun? I would have traded some of that fun when Blaster hit and we were caught with our pants down and unprotected
Originally posted by: CorporateRecreation
I am setting up a test environment with a fresh fully patched deployed XP box. Then I will add the 04-011 patch and see if I can still exploit it.
Originally posted by: SaigonK
Originally posted by: NogginBoink
Before this thread gets out of hand: I have contacts in the security group at Microsoft. I am finding out if MS04-011 protects against this from the horse's moth. I suspect that MS04-011 does protect against this, since MS04-011 does include a patch for an lsass vulnerability.
I checked with my Microsoft sources, 04-011 is made to fight this exploit.
http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx
Patch your machines..you should be all set.
Originally posted by: CorporateRecreation
In my test the patch did work however we do have machines that are patched that are still being attacked. My conclusion is that the patch does work but only if it's not been exploited or something. More on this when I get it.
Originally posted by: Jzero
Originally posted by: CorporateRecreation
In my test the patch did work however we do have machines that are patched that are still being attacked. My conclusion is that the patch does work but only if it's not been exploited or something. More on this when I get it.
It could be. With both slammer and blaster it wasn't enough to apply the patch, you also had to kill the bastard process.
Originally posted by: CorporateRecreation
Looks like this exploit can be found in the new work Gaobot, among other exploits.
Originally posted by: glugglug
I'll reiterate what I said when MSBlaster (both variants) & SQL Slammer were the headlines:
Anyone who has a windows box with NetBIOS or Samba ports internet accessible is an idiot. It's called a firewall people. Not one of these things would get through a simple NAT router like the one you would use to share cable/DSL on more than one computer in the default configuration. Holes in Windows on the NetBIOS & Samba ports are not new; this is the 4th time a hole on these specific ports has been patched in the past year. We were using the NetBIOS bugs to crash Windows 3.1 boxes in high school circa 1990.
These modern "virii" require stupidity to spread. Notable exception being corporate LANs that get infected by laptops operated by idiots who take them out of hibernate there.
If a hardware firewall isn't available (because for example, you use your laptop on the road), every software firewall will block these things in the default configuration as well. (except maybe the one built into WinXP)
Firewalls and common sense is far superior virus protection to any patches and/or "anti-virus" software. Unfortunately common sense is a misnomer because it is not common.
Originally posted by: Xionide
Originally posted by: jfall
ah.. the joys of running linux
You say that like its supperior or something. I mean if linux were top dog there would be virus' like this for it too.
-Xionide