Recent Remote Procedure problems

BlackHawkBlackHawk Bible music connoisseurThere's no place like 127.0.0.1 Icrontian
edited September 2003 in Science & Tech
If you get a pop-up like this:

attachment.php?postid=26074

It's due to this. The way to fix it is by downloading the patch for your OS from here and install it from safe mode.

Comments

  • NixxerNixxer Nottingham, UK
    edited August 2003
    Good idea mate, now everyone who didnt know before now can. I patched XP as soon as I read the thread sometime last week saying "Download is important by the latest Monday". Scared me :(
  • tychotycho Santa Barbara, California!
    edited August 2003
    good god that was not cool
    thanks for having this thread up today blackhawk... you saved me
  • BlackHawkBlackHawk Bible music connoisseur There's no place like 127.0.0.1 Icrontian
    edited August 2003
    Glad to help although I just wanted to put this help so others didn't have to search. Pic was from fuxor's thread along with the link posted by shorty. I still haven't got the problem.
  • ShortyShorty Manchester, UK Icrontian
    edited August 2003
    :thumbsup: Good idea Blackhawk
  • ArmoArmo Mr. Nice Guy Is Dead,Only Aqua Remains Member
    edited August 2003
    n1 BH, i pmed Jaketh cuz i saw his post about it, i hope he gets it fixed before he formats :)
  • SlickSlick Upstate New York
    edited August 2003
    My firewall seems to block the attack.
  • Straight_ManStraight_Man Geeky, in my own way Naples, FL Icrontian
    edited September 2003
    Unfortunately, that works for THAT one but as of today there are three MORE to patch. Base info here:

    http://zdnet.com.com/2100-1104_2-5074415.html

    Patch and then scanner run are recommended, and the OLD scanner for RPC flaws will report system is not patched.

    These are not XP only bugs, and two are buffer overflows and one is a flaw that lets an RPC data OVERLOAD yield complete access to a computer and DDOS use of it. I will try to follow through with more inof tomorrow when I get more details, but the Microsft Security advisory is here:

    http://support.microsoft.com/default.aspx?scid=kb;en-us;824146

    Quick summary:

    NT based Windows O\Ss ALL are affected, ME and down except for NT 4.0 are NOT capable of having this bug set even if DCOM is installed.

    Article is on support and a search of 'RPC Patch' led to Security Advisory MS03-039 which also should relate to Q824146 (note that the formal Q article was NOT posted as of 12:03 AM EDT US time, and support seems to have MANY requests for this advisory now and had to be refreshed twice to get to the Security Advisory). Microsoft is aksing ALL businesses to patch immediately, and ZDNet is expecting viruses and or trojans to become extant quickly so those with XP Pro need to patch also. XP Home is affected and needs to be patched also, but figure most here use Pro. Server 2003 is affected, 2000 Pro and servers also, and NT 4.0-- other than all of XP as operating system which is ALSO affected.

    Please be warned here first. Blocking with firewalls can be done if you block RPC inbound and outbound (Microsoft has an article linked to in advisory with port numbers), but the patches probably are to prevent repercussions from doing so also adn all need to take note of this.

    Admins may break thread off here if wanted, but please sticky it also unless you wish the thread topic to be handling recent RPC problems for more than one recent vulnerability that is now officially more than 4 (older ones exist also).

    John-- who is tagging onto and expanding a thread, and absolutely not trying to hijack it.
Sign In or Register to comment.