Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Microsoft Operating Systems Security Software Windows

Yet Another Critical Windows Flaw 511

Dynamoo writes "Microsoft released yesterday a whole bunch of critical security updates. Out of these, MS03-043 is a flaw in the Windows Messenger Service (not MSN Messenger) with the possibility of a remote attacker gaining complete control of a Windows NT/2000/XP/2003 based PC remotely. If this sounds like another possible vector for a worm to spread, you'd probably be right. Microsoft's recommendation is to 'disable the Messenger Service immediately and evaluate their need to deploy the patch'. Of course a firewall will offer some protection but shouldn't be relied on. At least administrators can disable the Messenger Service remotely. Of course this is another headache for admins still patching for last month's RPC flaw."
This discussion has been archived. No new comments can be posted.

Yet Another Critical Windows Flaw

Comments Filter:
  • Windows SUS (Score:5, Informative)

    by GangstaLean ( 102189 ) <gangstalean@birdintheb u s h . o rg> on Thursday October 16, 2003 @08:29AM (#7228249) Homepage
    Admins on sites exceeding 10 or so workstations may want to look into Windows SUS [microsoft.com], Software Update Services (SUS) gives the capability of integrated patch management and centralized patch distribution. This is sort of along the lines of RHN with a centralized console for distributing through a domain.


    It's useful.

  • by general_re ( 8883 ) on Thursday October 16, 2003 @08:35AM (#7228293) Homepage
    It could probably be somewhat simpler to disable it, but it's not all that bad. What they could do better is making sure that people know the difference between the Messenger service and the MSN Messenger app, as you seem to suggest.

    Anyway, in case anyone's reading this and doesn't know how to disable Messenger, go to Start -> Settings -> Control Panel -> Administrative tools -> Services. Right-click on Messenger and pull up the properties sheet. On the "general" tab, select "disabled" for "Startup type". Then hit the "Stop" button right under that on the "general" tab to stop the service if it's currently running. That's for 2K - I assume XP is similar.

  • by Jellybob ( 597204 ) on Thursday October 16, 2003 @08:41AM (#7228331) Journal
    They're having problems with some of their machines, including the one which distributes mod points, running slow.

    Which means that mod points aren't being given to as many people, which means there's less around to take things to +5.

    More details in Taco's Journal [slashdot.org].
  • Re:Windows SUS (Score:3, Informative)

    by mr_z_beeblebrox ( 591077 ) on Thursday October 16, 2003 @09:24AM (#7228569) Journal
    Any ideas anyone?

    Read this over and be sure that you understand what it does before you try it, better yet see if you can find it independently. Applying a registry patch from /. would be silly in the extreme. Here is the registry entry:

    Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Wi ndows\WindowsUpdate]
    "WUServer"="http://your.server.com"
    "WUStatusServer"="http://your.server.com"

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Wi ndows\WindowsUpdate\AU]
    "RescheduleWaitTime"=dword:00000005
    "NoAutoRebootWithLoggedOnUsers"=dword:00000001
    "NoAutoUpdate"=dword:00000000
    "AUOptions"=dword:00000004
    "ScheduledInstallDay"=dword:00000000
    "ScheduledInstallTime"=dword:00000003
    "UseWUServer"=dword:00000001

    Save that to a file called wu.reg or whatever.reg and then merge it with your registry.
  • by jweatherley ( 457715 ) <james@nosPam.weatherley.net> on Thursday October 16, 2003 @09:39AM (#7228625) Homepage
    Kernel32.dll is not the Windows kernel - that would be ntoskrnl.exe. Kernel32.dll contains the Win32 functions.
  • by Call Me Black Cloud ( 616282 ) on Thursday October 16, 2003 @09:41AM (#7228633)
    Microsoft released yesterday a whole bunch of critical security updates.

    Their new policy [myitforum.com] is to release monthly updates unless an exploit already exists, in which case a patch is immediately released.

    Out of these, MS03-043 is a flaw in the Windows Messenger Service ... Of course a firewall will offer some protection but shouldn't be relied on

    You don't know what you're talking about, submitter Dynamoo. Please, tell us why one shouldn't rely on a firewall? If you read the technical documentation [microsoft.com] about the flaw you see "If users have blocked the NetBIOS ports (ports 137-139) - and UDP broadcast packets using a firewall, others will not be able to send messages to them on those ports." (under "Technical Descriptions"). I think I'll ignore your advice and keep a firewall in place, no matter what OS I'm using.
  • Slashdot (Score:1, Informative)

    by Anonymous Coward on Thursday October 16, 2003 @10:32AM (#7229077)
    As much as I like slashdot, as a critical thinker, I have to entirely disregard its claim to be "news" when it is so obviously biased. This is not news, this is propaganda, worse than FOX news at times. Showing MS as a Borg Gates is hardly objective, which ought to be the goal of any self respecting news organization. How about we change the Linux penguin to him molesting small animals or children? That would be just as ludricous as this purported "news" about MS.
    Oh, BTW, I *do* use and run Linux (dyneBolic CD), so all you haters can shove it up you know where. One other thing -- I am a programmer, so I know what open source and that is all about, I like it, but I can see its flaws as well, unlike all you other zealots.
    I used to like this site more. Too bad its bias ruins its integrity in my eyes, just like FOX news "Fair and Balanced" BS.
  • Re:What? (Score:3, Informative)

    by Call Me Black Cloud ( 616282 ) on Thursday October 16, 2003 @10:51AM (#7229289)
    a firewall is not a perfect measure for protecting against this attack...Because some other machine behind the same firewall might become infected

    Good point - I was unclear. I should have quoted Microsoft's technical documentation. They specify configuring Windows' built-in firewall to block those ports. If the ports are blocked at each machine then an infected machine behind a hardware firewall will not infect other machines on the LAN.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...