Jump to content

Remote Proceedure Call Vulnerability


Recommended Posts

A word of warning to anyone relying on the microsoft hotfixes for the RPC vulnerability, I know of a few ppl that run a webserver off their net connections, and have the hotfixes installed. They were targeted by attackers using the RPC exploits, and the attackers were still able to compromise their systems using these exploits, even though the hotfixes were installed. My advice would be to either disable the RPC service, or block all incoming Remote Proceedure Calls on all ports, both TCP and UDP using a decent firewall. This will stop any RPC's from reaching your system, and effectively allowing a hacker to compromise your system.

Link to comment
Share on other sites


A hint that a lot of people don't know :

If you get that :rolleyes: screen, saying "Windows will reboot in ..:.."

Press Start, Run and type

shutdown /a

Then you can download the patch, without the reboots :D

And install a good firewall people... I don't understand why there are still so many people with port 135 open ... :)

Link to comment
Share on other sites

A hint that a lot of people don't know :

If you get that  :) screen, saying "Windows will reboot in ..:.."

Press Start, Run and type

shutdown /a

Not to step on your toes but it's "shutdown -a" not "shutdown /a".

I had this patch installed when it first was released but sadly it seems 99% of people did not and I've spent the last 3 days helping friends out with it.

Link to comment
Share on other sites

hmm, and MS expect us to trust AntiVirus solutions they've had a hand in...... doesn't bode well if you ask me if they can't even patch their own flaws successfully. i think the 16th will be a Linux day for me... :)

why wats happening on the 16th may i ask

Link to comment
Share on other sites

Not to step on your toes but it's "shutdown -a" not "shutdown /a".

I had this patch installed when it first was released but sadly it seems 99% of people did not and I've spent the last 3 days helping friends out with it.

It varies across Operating Systems. On XP its "-a", on Windows Server 2003 its "/a", and in Windows 2000 shutdown.exe doesn't exist.

Link to comment
Share on other sites

why wats happening on the 16th may i ask

A mass Denial of Service attack on WindowsUpdate from users infected with the MSBlaster worm. In fact this attack has already started due to some users' system clocks being ahead of time, and WU is showing signs of slowness.

This attack will prevent other users from downloading the RPC flaw fix.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...