[INFO] DE/JHF - Reenvio " Más Madera ésto es la..... "

11/09/2003 - 01:33 por Jesus Hernandez | Informe spam
NOTA: Windows ME y Windows 9.x no están afectados por este nuevo agujero.




De: "Jerry Bryant [MSFT]" <jbryant@online.microsoft.com>
Asunto: Microsoft Security Bulletin MS03-039 -
Fecha: miércoles, 10 de septiembre de 2003 18:24

Please note: Windows ME and Windows 9.x systems are not affected by this!

Title: Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)
Date: September 10, 2003
Software: Microsoft Windows NT Workstation 4.0; Microsoft Windows NT Server 4.0; Microsoft
Windows NT Server 4.0, Terminal Server Edition; Microsoft Windows 2000; Microsoft Windows
XP; Microsoft Windows Server 2003
Impact: Run code of attackers choice
Maximum Severity Rating: Critical
Bulletin: MS03-039

The Microsoft Security Response Center has released Microsoft Security Bulletin MS03-039

What Is It?
The Microsoft Security Response Center has released Microsoft Security Bulletin MS03-039
which concerns a vulnerability in the versions of Microsoft Windows listed above.

Microsoft has released a tool that can be used to scan a network for the presence of
systems which have not had the MS03-039 patch installed. More details on this tool are
available in Microsoft Knowledge Base article 827363. This tool supersedes the one
provided in Microsoft Knowledge Base article 826369 which was developed to scan systems
for the vulnerability patched by MS03-026.

More information is now available at
http://www.microsoft.com/technet/se...03-039.asp

In an effort to better communicate with our customers, Microsoft will also be conducting a
Webcast to provide guidance on Protecting Your PC and details of MS03-039.
http://www.microsoft.com/usa/webcas...g/2373.asp

If you have any questions regarding the patch or its implementation after reading the
above listed bulletin you should contact Product Support Services in the United States at
1-866-PCSafety (1-866-727-2338). International customers should contact their local
subsidiary.


Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and confers no rights.

Preguntas similare

Leer las respuestas

#1 kabus
11/09/2003 - 09:51 | Informe spam
¡Hola jesus!

¿Que es eso de agujero? nos podrías dar su nombre y como
se puede evitar, por favor.

Un saludo,Kabus
NOTA: Windows ME y Windows 9.x no están afectados por


este nuevo agujero.




De: "Jerry Bryant [MSFT]"
Asunto: Microsoft Security Bulletin MS03-039 -
Fecha: miércoles, 10 de septiembre de 2003 18:24

Please note: Windows ME and Windows 9.x systems are not


affected by this!

Title: Buffer Overrun In RPCSS Service Could Allow Code


Execution (824146)
Date: September 10, 2003
Software: Microsoft Windows NT Workstation 4.0; Microsoft


Windows NT Server 4.0; Microsoft
Windows NT Server 4.0, Terminal Server Edition; Microsoft


Windows 2000; Microsoft Windows
XP; Microsoft Windows Server 2003
Impact: Run code of attackers choice
Maximum Severity Rating: Critical
Bulletin: MS03-039

The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039

What Is It?
The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039
which concerns a vulnerability in the versions of


Microsoft Windows listed above.

Microsoft has released a tool that can be used to scan a


network for the presence of
systems which have not had the MS03-039 patch installed.


More details on this tool are
available in Microsoft Knowledge Base article 827363.


This tool supersedes the one
provided in Microsoft Knowledge Base article 826369 which


was developed to scan systems
for the vulnerability patched by MS03-026.

More information is now available at
http://www.microsoft.com/technet/se...etin/MS03-


039.asp

In an effort to better communicate with our customers,


Microsoft will also be conducting a
Webcast to provide guidance on Protecting Your PC and


details of MS03-039.
http://www.microsoft.com/usa/webcas...g/2373.asp

If you have any questions regarding the patch or its


implementation after reading the
above listed bulletin you should contact Product Support


Services in the United States at
1-866-PCSafety (1-866-727-2338). International customers


should contact their local
subsidiary.


Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and


confers no rights.





.

Respuesta Responder a este mensaje
#2 JESUS HERNANDEZ
11/09/2003 - 10:36 | Informe spam
Hola
Es simple información para los sistemas afectados.

Vulnerabilidad de desbordamiento de bufer en servicio RPCSS
permite la ejecución de codigo malicioso,
No estan afectados por ella windows Me y 98 y 95

Es simple información, y para avisar a los que tengan XP
o sistemas afectados: Boletin
http://www.microsoft.com/technet/se...03-039.asp

Saludos.
Nota Para detalles y demás:
microsoft.public.es.windowsxp.seguridad


"kabus" escribió en el mensaje
news:046501c37839$765f1e40$

¡Hola jesus!

¿Que es eso de agujero? nos podrías dar su nombre y como
se puede evitar, por favor.

Un saludo,Kabus
NOTA: Windows ME y Windows 9.x no están afectados por


este nuevo agujero.




De: "Jerry Bryant [MSFT]"
Asunto: Microsoft Security Bulletin MS03-039 -
Fecha: miércoles, 10 de septiembre de 2003 18:24

Please note: Windows ME and Windows 9.x systems are not


affected by this!

Title: Buffer Overrun In RPCSS Service Could Allow Code


Execution (824146)
Date: September 10, 2003
Software: Microsoft Windows NT Workstation 4.0; Microsoft


Windows NT Server 4.0; Microsoft
Windows NT Server 4.0, Terminal Server Edition; Microsoft


Windows 2000; Microsoft Windows
XP; Microsoft Windows Server 2003
Impact: Run code of attackers choice
Maximum Severity Rating: Critical
Bulletin: MS03-039

The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039

What Is It?
The Microsoft Security Response Center has released


Microsoft Security Bulletin MS03-039
which concerns a vulnerability in the versions of


Microsoft Windows listed above.

Microsoft has released a tool that can be used to scan a


network for the presence of
systems which have not had the MS03-039 patch installed.


More details on this tool are
available in Microsoft Knowledge Base article 827363.


This tool supersedes the one
provided in Microsoft Knowledge Base article 826369 which


was developed to scan systems
for the vulnerability patched by MS03-026.

More information is now available at
http://www.microsoft.com/technet/se...etin/MS03-


039.asp

In an effort to better communicate with our customers,


Microsoft will also be conducting a
Webcast to provide guidance on Protecting Your PC and


details of MS03-039.
http://www.microsoft.com/usa/webcas...g/2373.asp

If you have any questions regarding the patch or its


implementation after reading the
above listed bulletin you should contact Product Support


Services in the United States at
1-866-PCSafety (1-866-727-2338). International customers


should contact their local
subsidiary.


Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and


confers no rights.





.

Respuesta Responder a este mensaje
#3 JESUS HERNANDEZ
11/09/2003 - 13:03 | Informe spam
http://www.microsoft.com/security/s...03-039.asp

Que quiere decir esto en un boletin de microsoft ?: *** más problemas ?
Products Not Affected by This Update
Windows Millennium (Windows Me)

Note Windows 98, Windows 98 Second Edition (SE), and Windows 95 also are
not affected by this issue. However, these products are no longer supported.
*** Users of these products are strongly encouraged to upgrade to later
versions.
Saludos.
Respuesta Responder a este mensaje
#4 JM Tella Llop [MS MVP] ·
11/09/2003 - 14:30 | Informe spam
pues que a ver cuando de una vez usais un cortafuegos. y estareis protegidos has que salgan los parches.

Esto es la conclusion que hay que sacar. Y esto es en lo que hemos inisitido nosotros siempre.. y claro... nadie ni puto caso.

Jose Manuel Tella Llop
MS MVP - DTS


Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.





"JESUS HERNANDEZ" wrote in message news:
http://www.microsoft.com/security/s...03-039.asp

Que quiere decir esto en un boletin de microsoft ?: *** más problemas ?
Products Not Affected by This Update
Windows Millennium (Windows Me)

Note Windows 98, Windows 98 Second Edition (SE), and Windows 95 also are
not affected by this issue. However, these products are no longer supported.
*** Users of these products are strongly encouraged to upgrade to later
versions.
Saludos.











Respuesta Responder a este mensaje
#5 Ramón Sola
11/09/2003 - 21:45 | Informe spam
Lo que lees. Windows 98 como tal carece de soporte desde el mes julio, lo que significa que no se desarrollarán más parches dirigidos específicamente a él. Se aconseja a los usuarios que utilicen versiones posteriores, sí soportadas.
Pero eso no quiere decir que los componentes que se puedan instalar sobre él, como Windows Media, Office, Internet Explorer o DirectX, no tengan "derecho a parche" siempre y cuando éstos individualmente aún sigan teniendo soporte.
Los componentes que se publiquen a partir de mediados de enero del año que viene, según la documentación del ciclo de vida de los productos de Microsoft, ya no soportarán Windows 98.
Un saludo...

Ramón Sola @ Málaga.España

Enciende la luz antes de escribirme. ;-)))
Almunia interlocutaba con el Partido Popular. (¿era el interlocutor? ¿se
entrevistaba?; Ramón Jáuregui)


Las musas inspiraron a JESUS HERNANDEZ () para escribir:
http://www.microsoft.com/security/s...03-039.asp

Que quiere decir esto en un boletin de microsoft ?: *** más problemas ?
Products Not Affected by This Update
Windows Millennium (Windows Me)

Note Windows 98, Windows 98 Second Edition (SE), and Windows 95 also are
not affected by this issue. However, these products are no longer supported.
*** Users of these products are strongly encouraged to upgrade to later
versions.
Saludos.
Respuesta Responder a este mensaje
Ads by Google
Help Hacer una preguntaSiguiente Respuesta Tengo una respuesta
Search Busqueda sugerida