For those of you who are not aware of it yet, there has
been yet another discovery of buffer overflow weaknesses
in the Microsoft RPC DCOM handler, similar to the one
that was exploited by the MsBlaster(LovSan) and Welchia/
Nachia worms roughly a month ago. Atleast two instances
of the latest weaknesses can be used to gain remote system
level access to a windows computer.
Computers running Windows NT 4.0, Windows 2000 (all service
packs), Windows XP or Windows Server 2003 are by default
vulnerable to this buffer overflow, even if they have been
patched for the LovSan/Welchia worm.
SANS ISC reports that several groups are already working on
Internet worms that utilize this latest exploit (published
September 10th). In order to secure your windows PCs, please
fetch the latest security patches from
http://windowsupdate.microsoft.com/.
For more details and an advisory of the vulnerability:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-
039.asp
While this notification has nothing to do with BatMUD, I
figured that it may lay in the interrest of our players to
ensure that their PCs are not victims of the next batch of
network worms.
++ Gore