• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Well that didn't take long.

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    Well that didn't take long.

    Posted on Slashdot, which I only have indirect access to here, so no linky.

    The first Microsoft-confirmed Windows 7 zero-day vulnerability, with a demonstration exploit publicly available.

    The problem is in SMBv2 and SMBv1 and affects Windows 7 and Windows Server 2008 R2, but not Vista, XP, or Windows Server 2003. A maliciously crafted URI could hard-crash affected machines beyond any remedy besides pushing the white button.

    "Microsoft said it may patch the problem, but didn't spell out a timetable or commit to an out-of-cycle update before the next regularly-scheduled Patch Tuesday of December 8. Instead, the company suggested users block TCP ports 139 and 445 at the firewall."

    "As important as this the mentioned article is, it should also be pointed out that any IT staff worth their pay packet should already have port 139 blocked at the firewall, and probably port 445. too."
    "Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.

    #2
    No, your noddy anti-virus will save you.

    Comment


      #3
      Originally posted by DimPrawn View Post
      No, your noddy anti-virus will save you.

      And that made sense in which universe?
      "Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.

      Comment

      Working...
      X