Microsoft Security Bulletin MS03-026 - 823980

  • Thread starter Jerry Bryant [MSFT]
  • Start date
J

Jerry Bryant [MSFT]

Title: Buffer Overrun In RPC Interface Could Allow Code Execution
(823980)
Date: July 16, 2003
Software: Microsoft Windows NT(r) 4.0
Microsoft Windows NT 4.0 Terminal Services Edition Microsoft Windows 2000
Microsoft Windows XP Microsoft Windows Server(tm) 2003
Impact: Run code of attacker's choice
Maximum Severity Rating: Critical
Bulletin: MS02-026

The Microsoft Security Response Center has released Microsoft Security
Bulletin MS03-026

What Is It?
The Microsoft Security Response Center has released Microsoft Security
Bulletin MS03-026 which concerns a vulnerability in Microsoft Windows.
Customers are advised to review the information in the bulletin, test and
deploy the patch immediately in their environments, if applicable.

More information is now available at
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.

--
Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and confers no rights.
 
M

mole

Jerry Bryant said:
Title: Buffer Overrun In RPC Interface Could Allow Code Execution
(823980)
Date: July 16, 2003
Software: Microsoft Windows NT(r) 4.0
Microsoft Windows NT 4.0 Terminal Services Edition Microsoft Windows 2000
Microsoft Windows XP Microsoft Windows Server(tm) 2003
Impact: Run code of attacker's choice
Maximum Severity Rating: Critical
Bulletin: MS02-026
[snip]

When trying to download the patch for WinXP I get the following message:

"The download you requested is unavailable. If you continue to see this
message when trying to access this download, you might try the "Search for a
Download" area on the Download Center home page."

The NT4 and W2K downloads are available, but downloaded very slowly. This is
to apply the patch to ca. 700 workstations via a login script, so telling me
to go to the Windows Update site is not an option. Is the message due to
load on MS's servers or has the patch for XP been pulled or did the bulletin
I got stating:
"...
Title: Buffer Overrun In RPC Interface Could Allow Code
Execution (823980)

Date: 16 July 2003
Software: Microsoft(r) Windows (r) NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Impact: Run code of attacker's choice
Max Risk: Critical
Bulletin: MS03-026
...."

Include Windows XP in error?

Please advise and thanks,

mole
 
M

mole

[snip]
"The download you requested is unavailable. If you continue to see this
message when trying to access this download, you might try the "Search for a
Download" area on the Download Center home page."
[/snip]

I'll add that performing the search for a download turned up nothing
different either.

Thanks,

mole
 
K

Kristofer Gafvert

I had no problems downloading this for Windows XP.

Have you tried Windows Update Catalog? (That is downloading the file so you
can install it onto several PCs in your environment)

--
Regards,
Kristofer Gafvert
http://www.ilopia.com - Windows Server 2003 FAQ and tutorials
Reply to newsgroup only. Remove NEWS if you must reply by email.


mole said:
[snip]
"The download you requested is unavailable. If you continue to see this
message when trying to access this download, you might try the "Search
for
a
Download" area on the Download Center home page."
[/snip]

I'll add that performing the search for a download turned up nothing
different either.

Thanks,

mole
 
M

mole

Kristofer Gafvert said:
I had no problems downloading this for Windows XP.

Have you tried Windows Update Catalog? (That is downloading the file so you
can install it onto several PCs in your environment)
[snip]

Actually Kristofer, about 30 minuts ago I found it was available, downloaded
it and am ready to deploy. I suspect that there may have been a high load
demand on MS and thus the problem getting to the download page. It came down
very slow, but intact and error free.

Thanks,

mole
 
J

Jerry Bryant [MSFT]

There were some temporary issues with the availability of the download as
you saw. There were no changes to the patch.

--
Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and confers no rights.
mole said:
Kristofer Gafvert said:
I had no problems downloading this for Windows XP.

Have you tried Windows Update Catalog? (That is downloading the file so you
can install it onto several PCs in your environment)
[snip]

Actually Kristofer, about 30 minuts ago I found it was available, downloaded
it and am ready to deploy. I suspect that there may have been a high load
demand on MS and thus the problem getting to the download page. It came down
very slow, but intact and error free.

Thanks,

mole
 
J

Jerry Bryant [MSFT]

Title: Buffer Overrun In RPC Interface Could Allow Code Execution (823980)
Updated Date: July 18, 2003
Software: Microsoft Windows NT® 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows ServerT 2003
Impact: Run code of attacker's choice
Maximum Severity Rating: Critical
Bulletin: MS02-026

Update 07/18/2003:
Microsoft originally released this bulletin and patch on July 16, 2003 to
correct a security vulnerability in a Windows Distributed Component Object
Model (DCOM) Remote Procedure Call (RPC) interface. The patch was and still
is effective in eliminating the security vulnerability. However, the
"mitigating factors" and "workarounds" discussions in the original security
bulletin did not clearly identify all of the ports by which the
vulnerability could potentially be exploited. We have updated this bulletin
to more clearly enumerate the ports over which RPC services can be invoked,
and to ensure that customers who have chosen to implement a workaround
before installing the patch have the information that they need to protect
their systems. Customers who have already installed the patch are protected
from attempts to exploit this vulnerability, and need take no further
action.

Customers are advised to review the bulletin for additional information.

The Microsoft Security Response Center has released Microsoft Security
Bulletin MS03-026

What Is It?
The Microsoft Security Response Center has released Microsoft Security
Bulletin MS03-026 which concerns a vulnerability in Microsoft Windows.
Customers are advised to review the information in the bulletin, test and
deploy the patch immediately in their environments, if applicable.

More information is now available at
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.


--
Regards,

Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities

Get Secure! www.microsoft.com/security


This posting is provided "AS IS" with no warranties, and confers no rights.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top