Noriu Jus informuoti, kad Microsoft ką tik, nelaukdami eilinio atnaujinimų trečiadienio, išleido saugos biuletenį MS08-067 ir kritinį Windows OS atnaujinimą KB958644, kurį Jūs turėtumėte įdiegti kiek galima skubiau.
SVARBU! Prašome informuoti Microsoft apie:
klientų ar Jūsų *nesėkmingus* šios pataisos diegimo atvejus;
pastebėtus virusus/kirminus, kurie išnaudoja šį pažeidžiamumą.
Tokią informaciją mes eskaluosime atitinkamoms reagavimo komandoms, kurios imsis papildomų veiksmų.
Toliau informacija pateikiama anglų kalba:
What is the purpose of this alert?
This alert is to provide you with an overview of the new security bulletin released (out of band) on October 23, 2008. Microsoft has released security bulletin MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644), to address a vulnerability in all currently supported versions of Windows. This security update was released outside of the usual monthly security bulletin release cycle in an effort to protect customers.
Executive Summary
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.
Recommendations
Microsoft recommends customers prepare their systems and networks to apply this security bulletin immediately once released to help ensure that their computers are protected from attempted criminal attacks. For more information about security updates, visit http://www.microsoft.com/protect.