PDR: 10 September 2003 Special Edition
WINDOWS: Buffer Overrun In RPCSS Service Could Allow Code Execution (824146) Basically, an attacker could send a bad message to the system that allows services to talk to each other between computers. This message would cause the service that manages these communications to fail, and at that point the attacker can install software, add users, or basically do whatever they want. The patch addresses three specific flaws that showed up within the same system. All three lead to the same result. Patches: Windows Server 2003 | Windows XP | Windows 2000 | Windows NT 4 | Network Scanning Tool | More Here References: TechNet Version | End User Version | Network Scanning Tool |
This warning supersedes the warning that discussed the MSBlaster vulnerability. What that means is, this alert deals with the same problems that the MSBlaster one did, and more. If you're reading this, stop what you are doing, and either download the scanning tool, or just install the patch immediately. Don't fool around with this one. The more people that patch, the less likely another MSBlaster will show up.
That does it for this special edition of the Patch Day Review. Check back this evening for our regularly scheduled update. Now if you'll excuse me, I have a patch to install ;).