紧急通告DCOM RPC漏洞掀起蠕虫攻击狂潮
/ns/wz/otherwz/data/20030812191517.htm
					      于8月12日起,国内出现利用RPC漏洞进快速传播的蠕虫病毒,并命名为:“冲击波(新流言)”(Worm.MSblaster)。RPC漏洞会带来更大的危害,更强的传播性。事实上,在漏洞出现的时候就陆陆续续的出现了各种针对此漏洞的多种蠕虫病毒,早期的这些蠕虫病毒只是攻击此漏洞,造成远端系统的崩溃,而“新流言”的出现将漏洞的危害发挥到极致--它利用漏洞进行快速传播。我们有理由相信,在近一段时间内将会有更多类似的蠕虫病毒出现,将会掀起新一轮的蠕虫攻击狂潮。该漏洞会引起如此巨大的危害,是因为其应用的广泛性造成的,它会对x下列微软操作系统平台造成危害(简单点说就是除了9x/me外的所有的微软的操作系统)。
   Microsoft Windows 2000 Advanced Server SP4 
   Microsoft Windows 2000 Advanced Server SP3 
   Microsoft Windows 2000 Advanced Server SP2 
   Microsoft Windows 2000 Advanced Server SP1 
   Microsoft Windows 2000 Advanced Server 
   Microsoft Windows 2000 Datacenter Server SP4 
   Microsoft Windows 2000 Datacenter Server SP3 
   Microsoft Windows 2000 Datacenter Server SP2 
   Microsoft Windows 2000 Datacenter Server SP1 
   Microsoft Windows 2000 Datacenter Server 
   Microsoft Windows 2000 Professional SP4 
   Microsoft Windows 2000 Professional SP3 
   Microsoft Windows 2000 Professional SP2 
   Microsoft Windows 2000 Professional SP1 
   Microsoft Windows 2000 Professional 
   Microsoft Windows 2000 Server SP4 
   Microsoft Windows 2000 Server SP3 
   Microsoft Windows 2000 Server SP2 
   Microsoft Windows 2000 Server SP1 
   Microsoft Windows 2000 Server 
   Microsoft Windows NT Enterprise Server 4.0 SP6a 
   Microsoft Windows NT Enterprise Server 4.0 SP6 
   Microsoft Windows NT Enterprise Server 4.0 SP5 
   Microsoft Windows NT Enterprise Server 4.0 SP4 
   Microsoft Windows NT Enterprise Server 4.0 SP3 
   Microsoft Windows NT Enterprise Server 4.0 SP2 
   Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0
     Microsoft Windows NT Server 4.0 SP6a 
   Microsoft Windows NT Server 4.0 SP6 
   Microsoft Windows NT Server 4.0 SP5 
   Microsoft Windows NT Server 4.0 SP4 
   Microsoft Windows NT Server 4.0 SP3 
   Microsoft Windows NT Server 4.0 SP2 
   Microsoft Windows NT Server 4.0 SP1 
   Microsoft Windows NT Server 4.0 
   Microsoft Windows NT Terminal Server 4.0 SP6a 
   Microsoft Windows NT Terminal Server 4.0 SP6 
   Microsoft Windows NT Terminal Server 4.0 SP5 
   Microsoft Windows NT Terminal Server 4.0 SP4 
   Microsoft Windows NT Terminal Server 4.0 SP3 
   Microsoft Windows NT Terminal Server 4.0 SP2 
   Microsoft Windows NT Terminal Server 4.0 SP1 
   Microsoft Windows NT Terminal Server 4.0 
   Microsoft Windows NT Workstation 4.0 SP6a 
   Microsoft Windows NT Workstation 4.0 SP6 
   Microsoft Windows NT Workstation 4.0 SP5 
   Microsoft Windows NT Workstation 4.0 SP4 
   Microsoft Windows NT Workstation 4.0 SP3 
   Microsoft Windows NT Workstation 4.0 SP2 
   Microsoft Windows NT Workstation 4.0 SP1 
   Microsoft Windows NT Workstation 4.0 
   Microsoft Windows Server 2003 Datacenter Edition 
   Microsoft Windows Server 2003 Datacenter Edition 64-bit 
   Microsoft Windows Server 2003 Enterprise Edition 
   Microsoft Windows Server 2003 Enterprise Edition 64-bit 
   Microsoft Windows Server 2003 Standard Edition 
   Microsoft Windows Server 2003 Web Edition 
   Microsoft Windows XP 64-bit Edition SP1 
   Microsoft Windows XP 64-bit Edition 
   Microsoft Windows XP Home SP1 
   Microsoft Windows XP Home 
   Microsoft Windows XP Professional SP1 
   Microsoft Windows XP Professional 
   为了防范此漏洞带来的危害,请各位广大用户赶快为您的操作系统打上相应的修复补丁,下面是微软补丁的链接地址
   http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp 
   如果,未能即时下载补丁的用户,请用防火墙禁用135、139、445端口,以免受到蠕虫的攻击。
							20CN网络安全小组
							   2003-08-12
===============================================
本文版权属20CN网络安全小组及其作者所有,如有转载,请保持文章完整性并注明出处
文章类型:原创 提交:NetDemon 核查:NetDemon