RPC

  • Thread starter Thread starter Skip
  • Start date Start date
S

Skip

Is it my imagination, or are we getting repeated Remote
Procedure Call Service problems.Is this a Windows update
bug or just a coincidence?.....any thoughts?
 
-----Original Message-----
Is it my imagination, or are we getting repeated Remote
Procedure Call Service problems.Is this a Windows update
bug or just a coincidence?.....any thoughts?
.

I am still hoping for an answer on this myself. :(
Chelle
 
Chad;
First, IMMEDIATELY disconnect from the internet before a "friend"
leaves a gift on your computer for you.
DO NOT reconnect until this issue is resolved.

Install or enable a firewall immediately.
http://support.microsoft.com/?kbid=283673

Run an updated virus scan.
Or Scan for Viruses online:
http://security.symantec.com/ssc/home.asp?j=1&langid=ie&venid=sym&plfid=23&pkj=IRLFIZTYMWPAZTJWUFJ

Also be sure to update immediatly to prevent this in the future:
http://windowsupdate.microsoft.com/

This will tell you more:
http://www.microsoft.com/security/security_bulletins/ms03-026.asp
 
You need to read http://www.microsoft.com/security/security_bulletins/ms03-026.asp

An exploit for this vulnerability is already being used and is fairly
well publicized. The port scans and attacks have increased
dramatically in the alst few days (just look at the number of people
posting to newsgroups with this problem). Their are two versions of
the exploit I am aware of. One gives an attacker full control of your
machine, the other is a denial-of-service attack. Both disable the
RPC service when utilitized (thus the error messages you are seeing).
RPC (or is it DCOM?) uses ports 135, 139, and 445. All are crucial to
basic windows functionality so when it's suggested to "disable" those
ports, forget about it. A firewall is what you need. Or at least a
Cable/DSL router since it NAT's your ip address. That's what I use at
home, therefore making port 135 completely inaccessible from the
Internet. In the meantime, install the patch Microsoft recommends in
the bulletin above.

In case you can't access the bulletin, you can download the patch
directly at http://download.microsoft.com/downl...e-b7a52a983f01/WindowsXP-KB823980-x86-ENU.exe

You should only install this patch on Windows XP machines. 2000 and
NT4 have different patches. Windows ME, Windows 95, and Windows 98
are not affected by this vulnerability (they have their own set of
issues... :).

Benny
http://www.lifeway.com
 
Back
Top