Hi,
It's (possible|probable) that the above was included in the list postings
in February last; at that time I hadn't even begun with Samba (use it in
production now :). If so,please point me at the archives, if not, could
someone please comment?
>From the last SANS NewsBites (apologies for the line break in the URL for
those using 76-character text MMUAs):
WORMS, ACTIVE EXPLOITS, VULNERABILITIES, AND PATCHES
--SMB Protocol Flaw Patch Not Readily Available for NT 4.0
(11 March 2005)
On February 8, 2005, Microsoft released an advisory for a vulnerability
in the server message block (SMB) protocol in Windows that could allow
an attacker to take control of vulnerable servers. However, Microsoft
released patches for only more recent versions of Windows; there was no
patch for Windows NT 4.0, as the company stopped officially supporting
it on December 31, 2004. Microsoft does have a patch for NT 4.0
customers who have paid for extended support. Users could enable SMB
signing as some form of protection; Microsoft is encouraging users to
upgrade to Server 2003 for security reasons.
http://www.theage.com.au/news/Breaking/Windows-NT4-servers-open-to-hackers/2005/03/11/1110417668599.html#
Thanks,
--Tonni
--
mail: tonye@billy.demon.nl
http://www.billy.demon.nl