Honda Motorcycles - FireBlades.org banner

1 - 11 of 11 Posts

·
Registered
Joined
·
16,568 Posts
Discussion Starter #1
This e-mail message is being sent to you by Microsoft Corporation. To verify the authenticity of this e-mail message, please visit: http://go.microsoft.com/?linkid=221454


Dear Microsoft Customer,

On August 11, 2003, Microsoft began investigating a report of a worm, known as W32.Blaster.Worm, that exploits the vulnerability addressed by Microsoft Security Bulletin MS03-026. Microsoft released this critical security bulletin and corresponding patch for Windows operating systems on July 16, 2003. While some customers may not notice the presence of the worm infection at all on their computer systems, typical symptoms may include Windows XP and Windows Server 2003 systems rebooting every few minutes without user input or Windows NT4 and Windows 2000 systems becoming unresponsive.

If you applied security patch MS03-026 prior to the discovery of the Blaster worm, your system is secure from the vulnerability that W32.Blaster is using. For the most current information on determining if your systems are infected and how to recover from the infection, please go to the following Web site and perform the prescribed steps: http://go.microsoft.com/?linkid=221455. This site will be updated as more information regarding the W32.blaster worm becomes available.

Our goal is to provide you with the information and tools you need to help run your company safely and reliably. When we become aware of these types of vulnerabilities, it is our goal to share protection and remediation information with you as quickly as is possible. In order to help protect your computing environment from security vulnerabilities, we encourage you to use the Windows Update service by going to http://go.microsoft.com/?linkid=221456 and also subscribe to Microsoft's security notification service at http://go.microsoft.com/?linkid=221457. By using these two services you will automatically receive information on the latest software updates and the latest security notifications, thereby improving the likelihood that your computing environment will be safe from the worms and viruses that occur.

Thank you,

Microsoft Corporation


For information about Microsoft's privacy policies, please go to http://go.microsoft.com/?linkid=221453
 

·
Registered
Joined
·
161 Posts
The message may well be lgit. My info is a little loose but MS are running a big ad campaign tomorrow as apparently some deadline or tother is approaching for the worm's triggering attacks on MS servers.
 

·
Registered
Joined
·
6,134 Posts
nedro : Does that mean windows 98 is NOT effected?
Microsoft Windows XP Professional
Microsoft Windows XP Home Edition
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Tablet PC Edition
Microsoft Windows Server 2003, Web Edition
Microsoft Windows Server 2003, Standard Edition
Microsoft Windows Server 2003, Enterprise Edition
Microsoft Windows Server 2003, Datacenter Edition
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server
Microsoft Windows NT Server
Microsoft Windows NT Advanced Server
Microsoft Windows NT Server, Enterprise Edition
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Server 4.0 Terminal Server Edition
Microsoft Windows XP 64-Bit Edition Version 2002
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows Server 2003, 64-Bit Enterprise Edition

I don't see your OS in the list Nedro.

2OHOH2954 posted a great link for FixBlast, a tool by Symantec that will search and remove the worm if you should have it. It's a free tool as well.

Here is the other thread where all of this was discussed (meow)

http://www.fireblades.org/cgi-bin....us;st=0

And the link to download FixBlast, 20H put it up on his personal site for download.

ftp://eurotechie.com/IO/
 

·
Registered
Joined
·
10,531 Posts
Microsoft is trying like mad to get out the word because the worm's designed purpose is to flood their update servers with requests, causing a denial of service error tomorrow, August 16th.
Of course, anyone that paid attention three weeks ago when the RPC flaw was announced and downloaded the patch then has absolutely no problems.
 
1 - 11 of 11 Posts
Top