• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Not hot but FREE!!! MSBlast Patch Alternate site!

why's it so important that you have the patch? just stay on top of the windows updates, and you're fine
 
Originally posted by: s0ssos
why's it so important that you have the patch? just stay on top of the windows updates, and you're fine

I run windows update generally once a month.
 
Get that worm and you will know exactly why it is important to have that patch.

Tried the download site recently?

That worm was the cause of my Internet being out for the last 48 hours and I have had a few customers get hit by it, constant reboots.
 
hehe, all ISPs have already recorded info about this virus and when u call them they tell u to push 1 if that's what you're looking help for. my friend who has a small isp said he got 600 calls that day.

//krunk (^_^x)
 
Originally posted by: s0ssos
why's it so important that you have the patch? just stay on top of the windows updates, and you're fine

(1) Because the worm will attempt to use your PC as a jump off point to spread itself.
(2) Because it is set to do a DoS on the Windows Update site on 8/16 (MSBlaster)
(3) Do you want your system to be compromised?

Those are all reasons that the patch is important. Even more so if you have multiple PC/Servers that you are responsible for. Also, WU does not work for NT4 machines, for those who are still at that level.

So, unless you are trying to help spread the worm, it is probably a good idea to make sure you have patch 823980 installed on your Windows machine.

Also, the WU site has been hammered since Monday afternoon, along with the MS Support Lines.

 
why's it so important that you have the patch? just stay on top of the windows updates, and you're fine

You guys don't quite understand the comment. All he is saying is that if you have done a windows update recently you already have the patch. So quit scaring people into thinking they need to install the patch - if they already did a windows update they don't need the patch.
 
I heard if you are running the older OSes (Win98, Win2k) the Update site won't tell you you need to install the patch, it only works with XP.

Does anybody know if that is true?
 
Originally posted by: GLazarides
I heard if you are running the older OSes (Win98, Win2k) the Update site won't tell you you need to install the patch, it only works with XP.

Does anybody know if that is true?

This patch is only needed for NT, 2K, and XP so won't show for Win98, but I wouldn't see why it wouldn't for NT or 2K. Just use the link in my previous post, goes right to the patch page where you can select your OS then download.
 
The RPC patch that gets applied to your system via Windows Update does not always patch it correctly. I had a server at my work that was "patched" by windows update twice and still showed vulnerable. Had to run it manually. (This was on 2000 Server)
 
I updated about 30 NT and Win2K servers and a couple of XP workstations between 1am and 6am this morning. Although I couldn't get to windowsupdate yesterday during normal business hours, it was ok between these hours this morning and every box patched correctly through windowsupdate.com. If you are unsure if you are patched or not, download the Retina Dcomm scanner here: http://www.eeye.com/html/Research/Tools/RPCDCOM.html

Retina link

You have to register (free) and they will send you a link to download the tool with a couple of minutes. It is very quick and they also have several other scanners that will let you know if you are open to older vulnerabilities.
 
Sorry about the duplicate posts. The forum looked as though it wasn't posting from here. Is there any way to delete your own post?
 
FYI: For those of you who hate registering🙂, Microsoft released a free to download tool for searching for unpatched systems.
Link
 
1) Right-click on 'My Computer', select 'Properties'.
2) Select the tab labeled 'Automatic Updates'
3) Check "Keep my computer up to date"
4) Select any of the three settings.
5) Hit "Ok"
6) Relax.

Your pc can check every day without bothering you & just let you know when there is an update. This would've installed the MSBlast patch on 7/16.
 
Microsoft took down WindowsUpdate.com on purpose.

You can reach WindowsUpdate via clicking on the link from your start menu.

The person who wrote the virus was retarded and programmed it to attack "WindowsUpdate.com". So naturally microsoft just took it down...

The new address is windowsupdate.microsoft.com.

Link

Can't be a DOS attack if "WindowsUpdate.com" does not exist.
 
Originally posted by: RedShirt
Microsoft took down WindowsUpdate.com on purpose.

You can reach WindowsUpdate via clicking on the link from your start menu.

The person who wrote the virus was retarded and programmed it to attack "WindowsUpdate.com". So naturally microsoft just took it down...

The new address is windowsupdate.microsoft.com.

Link

Can't be a DOS attack if "WindowsUpdate.com" does not exist.


It has always been http://windowsupdate.microsoft.com ... windowsupdate.com just redirected you there. The programmer didnt recognize that i guess.
 
To be safe block TCP ports 135 through 145 (netbios, snb et al) and UDP port 69 (Tftp). There's also a higher port number (4441?) that should be killed.
 
So if you've been doing regular windows update OR have a router/firewall OR are running the built in XP firewall, you are fine? Why is this virus so blown out of proportion? Seems like the basics of any virus.
 
Back
Top