Friday, October 24, 2008

Critical Windows Vulnerability

If you do not have a service agreement with Servcom USA, you will need to contact our office immediately to schedule the installation of the fix for this Windows vulnerability. Please note that a patch has been released, but it must be installed ASAP. Customers under a current service agreement will be handled automatically. (Contract customers do not have to request installation of this patch.)

For more details on this problem, to see a list of affected operating systems, or for more information, you can see the full Microsoft Security Bulletin here.

Again, this is a VERY serious problem. You need to have this addressed on your servers and workstations IMMEDIATELY.


 

A repost of the Microsoft Security Bulletin released yesterday:

Microsoft Security Bulletin MS08-067 – Critical

Vulnerability in Server Service Could Allow Remote Code Execution (958644)

Published: October 23, 2008

Version: 1.0

General Information

Executive Summary

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.

This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. Microsoft recommends that customers apply the update immediately.