ViRGE
Elite Member, Moderator Emeritus
A critical flaw has been found that allows remote code execution, through a specifically crafted RPC request against the Server service (i.e. this is a SMB exploit). MS has issued an "out-of-band" patch to immediately fix this, as all versions of Windows are vulnerable.
Windows 5.xx: Completely Vulnerable/Critical (No authentication required)
Windows 6.xx: Partially Vulnerable/Important (The attacker would need appropriate authentication credentials)
Firewalls can block this, but only if they're configured to block SMB requests. This means that most computers in a LAN are vulnerable to each other, should an exploit be deployed in such a way that it can cross the network's firewall (i.e. delivered via infected laptops or an email-based worm).
This is currently being exploited in the wild
Patch today, before certain doom strikes us all! 😉
Windows 5.xx: Completely Vulnerable/Critical (No authentication required)
Windows 6.xx: Partially Vulnerable/Important (The attacker would need appropriate authentication credentials)
Firewalls can block this, but only if they're configured to block SMB requests. This means that most computers in a LAN are vulnerable to each other, should an exploit be deployed in such a way that it can cross the network's firewall (i.e. delivered via infected laptops or an email-based worm).
This is currently being exploited in the wild
Patch today, before certain doom strikes us all! 😉