[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Security hotlist



PureBytes Links

Trading Reference Links

www.grc.com  has some good ideas on unbinding the netbui from TCP, may help
some
----- Original Message -----
From: "Mark Jurik" <mark@xxxxxxxxxxxx>
To: "'Omega List'" <Omega-list@xxxxxxxxxx>; "'Realtraders'"
<realtraders@xxxxxxxxxxxxxxx>
Sent: Wednesday, September 13, 2000 9:15 AM
Subject: Security hotlist


> A vulnerability exists in the Microsoft Windows implementation of NetBIOS
in Windows 95, 98, NT, 2000. Remote users can insert and flush dynamic cache
entries and overwrite static entries. This enables a malicious user to
change the IP address assigned to a NetBIOS Name. A workaround is to block
TCP and UDP ports 135-139 and 445 on your firewall or router.
>
> Unfortunately, @Home cable modem uses UDP ports 137-139.
>
> -----------------------------------
>
> This security notice was derived from the SecuritySearch.Net Vulnerability
Report. To subscribe to this newsletter send an e-mail to
vreport@xxxxxxxxxxxxxxxxxx with the word "subscribe" in the message body.
>
> -----------------------------------
>
> Regards,
> Mark Jurik
>
>