postreply Home » Forums » Cabal Online » Cabal Online - News

Windows Server Service Malicious Code Vulnerability Emergen : Cabal Online - News

Posted: November 14th, 2008, 4:02 pm
Gaming-News

Total Posts: 15977
Joined: August 21st, 2004, 4:36 pm
Image Windows Server Service Malicious Code Vulnerability Emergency Warning
Windows Server Service Malicious Code Vulnerability Emergency Warning

* MS08-067 Security Patch Emergency Install Required

Caution Regarding...

Author: [GM]Dragon
Category: Official News and Announcements
Publish Date: Tue, 28 Oct 2008 10:04:20 GMT

Windows Server Service Malicious Code Vulnerability Emergency Warning

* MS08-067 Security Patch Emergency Install Required

Caution Regarding Circulation of Malicious Codes through MS08-067 Security Vulnerability

The Security Analysis & Response Center of internet security company INCA Internet (www.nprotect.com) has detected a malicious code that uses Microsoft Windows’ vulnerability (MS08-067) is in circulation abroad, and has asked for Windows users to be particularly cautious and promptly install the emergency security patch.

Full Story :

Full Story

Windows Server Service Malicious Code Vulnerability Emergency Warning

* MS08-067 Security Patch Emergency Install Required

Caution Regarding Circulation of Malicious Codes through MS08-067 Security Vulnerability

The Security Analysis & Response Center of internet security company INCA Internet

(www.nprotect.com) has detected a malicious code that uses Microsoft Windows?

vulnerability (MS08-067) is in circulation abroad, and has asked for Windows users

to be particularly cautious and promptly install the emergency security patch.

This attack was due to the vulnerability of remote code being executable in the

Server Service, in which the attacker used an RPC(Remote Procedure Call)

forwarding method to attack, and the malicious code can be circulated through TCP

ports 139 and 445.

[Reference]

- Server Service : Function that supports the sharing of files, folders, and peripheral

equipments in MS Windows

- RPC : Protocol used to request the services of programs in other computers in the

network

The operating system products that are exposed (or affected) by this vulnerability

are as follows.

- Microsoft Windows 2000 SP4

- Microsoft Windows XP SP2, SP3

- Microsoft Windows XP Professional x64 Edition, SP2

- Microsoft Windows Server 2003 SP1, SP2

- Microsoft Windows Server 2003 SP1, SP2 for Itanium-based Systems

- Microsoft Windows Server 2003 x64 Edition, SP2

- Windows Vista, SP1

- Windows Vista x64 Edition

- Windows Server 2008, x64 Edition, Itanium-based Systems

Microsoft has announced an emergency security patch on October 23rd local time.

http://www.microsoft.com/technet/sec.../MS08-067.mspx

If for any reason you cannot install the security patch, please check whether the

TCP ports 139 and 445 are in use, and if they are not absolutely necessary, it is also

possible to temporarily block them in the firewall.

Because there is a possibility that the attack of malicious codes through this

vulnerability will continuously emerge, we strongly encourage users to install the

security patch (MS08-067).

Currently in Japan, 9 malicious codes that use this vulnerability were found in

certain sites, and INCA Internet?s Security Analysis & Response Center is undergoing

an emergency update.

If you suspect that your system has been infected, or if your system shows

abnormal symptoms, you can diagnose whether your system is infected through

nProtect?s homepage (www.nprotect.com), and the date of the product update

which allows the diagnosis is from the October 24th, 2008 Emergency Update.

(Author : INCA Internet?s Security Analysis & Response Center Jong-Hyun Moon)
Read more...
Want Advertisements After The Last Post Removed? Create A Free Account!
blue large dotWho is online
Users browsing this forum: No registered users and 2 guests