New Windows vulnerability alert (04/23/04)
Posted: 18:00:00, Sunday, Apr 25, 2004 Expiration: 18:00:00, Friday, Apr 30, 2004
There are reports of new exploits of security vulnerabilities for Windows. Those who have a department tech support person should talk to them about patching their system. Those who do not have a department support person should patch their machine per the directions from Microsoft. DoIT Security will likely begin scanning campus machines for unpatched hosts. You will receive a notice if your computer appears to be vulnerable is not patched by next week.Essential Support Critical Security Alert - Malicious Activity Relating to MS04-011
Microsoft is aware of code available on the Internet that seeks to exploit vulnerabilities addressed as part of our April 13th security updates. We are investigating the situation to help protect our customers. Specifically, the reports detail exploit code that attempts to use the IIS PCT/SSL vulnerability on servers running Internet Information Services with the Secure Socket Layer authentication enabled. This vulnerability is addressed by bulletin MS04-011. Customers who have deployed MS04-011 are not at risk from this exploit code.
Microsoft considers these reports credible and serious and continues to urge all customers to immediately install the MS4-011 update as well as the other critical updates provided on April 13th.
Customers who are still evaluating and testing MS04-011 should immediately implement the workaround steps detailed for the PCT/SSL vulnerability detailed in the MS04-011. In addition, Microsoft has published a knowledge base article KB187498 which provides additional details on SSL and how to disable PCT without applying MS04-011.
Microsoft expects to see additional exploits and proof-of-concept code targeting the April 2004 security bulletin release in coming days and weeks, potentially including worm or virus examples.
-- DoIT News
Created: 07:59:53, Monday, Apr 26, 2004 (by Chris M.)
Updated: 08:55:57, Monday, Apr 26, 2004 (by Chris M.)