So you came home to find a pink pussy...

Well then.  I'm going to walk away from my computer now and find a
quite section of the building to giggle my ass off in.  Thank you very
much.

--
ME2



On Mon, Oct 27, 2008 at 7:53 AM, James Rankin <[EMAIL PROTECTED]> wrote:
> It is a long time since I've had to do one of these "panic" patch
> deployments, so I think that MS must be getting on top of it - most of the
> time :-)
>
> On a lighter note, when I got home yesterday morning my cat was pink. I kid
> you not, God knows what he has been into.
>
> 2008/10/27 Ziots, Edward <[EMAIL PROTECTED]>
>>
>> Ken,
>>
>> NO offense but I am too tired and pivved off about this to comment
>> anymore about technical merits, or who is right or wrong. This
>> vulnerability is attacking the same darn service that MS06-040 did, with
>> the same result, unauthenticated remote code execution that is
>> propagating malware, spyware and worm activity which could definitely
>> bring networks to a halt and have a snowball effect across the next.
>>
>> Like I said before, /End Thread... Moving on..
>>
>> Thanks
>> EZ
>>
>> Edward E. Ziots
>> Network Engineer
>> Lifespan Organization
>> MCSE,MCSA,MCP,Security+,Network+,CCA
>> Phone: 401-639-3505
>> -----Original Message-----
>> From: Ken Schaefer [mailto:[EMAIL PROTECTED]
>> Sent: Sunday, October 26, 2008 9:27 PM
>> To: NT System Admin Issues
>> Subject: RE: Out of Cycle Critical Windows Patch ?
>>
>> Nothing you are saying is in dispute here. But I still don't see any
>> argument as to why this is the "same type" of vulnerability in 06-040
>> that you previously stated, or why it should have been fixed as such.
>>
>> That you need to spend time patching things isn't different to anyone
>> else here. Unfortunately it's a facet of running software these days -
>> no matter what the platform you'd be having to the same thing. So, if
>> you are venting, then by all means vent. If you are making some claim
>> about the technical aspects of this vulnerability or patch, then as I
>> asked before, can you provide some information/facts/evidence/etc to
>> substantiate that. Not that I'm doubting you per se, but I'm always
>> looking to further my own technical knowledge (which is why I'm on this
>> list)
>>
>> Cheers
>> Ken
>>
>> > -----Original Message-----
>> > From: Ziots, Edward [mailto:[EMAIL PROTECTED]
>> > Sent: Monday, 27 October 2008 12:08 PM
>> > To: NT System Admin Issues
>> > Subject: RE: Out of Cycle Critical Windows Patch ?
>> >
>> > Ken,
>> >
>> > Basically it's a juicy door for exploits, unauthenticated remote code
>> > execution, non-authenticated access is just that, unauthenticated, no
>> > trust, no authenticated before authorization and legitimate access. It
>> > basically a violate of AAA security principles. Honestly, I personally
>> > loathe any type of weak or non-existent access to systems, and we seen
>> > it in this one that it keeps opening up the door for attacks.
>> >
>> > Any its pretty easy to get authenticated credentials harvested from
>> one
>> > exploited system and use these to wack the rest of them. A quick
>> > exploit, dump the hashes, run em through ophcrack or jack the ripper,
>> > and then impersonate those credentials ( hey generic dumb user) and
>> then
>> > run your exploit. Its about a trivial exercise. SO as for Vista and
>> W2k8
>> > being a little less vulnerabile, sorry they are just as vulnerable as
>> > the Win2k,XP, and Win2k3 boxes, when you look at them being on the
>> same
>> > network as the others mentioned.
>> >
>> > Again, it's a total pain in the preverbal keister, been up far too
>> many
>> > hours getting my network straight with this patch, calling for a lot
>> of
>> > downtime, and disrupting operations.
>> >
>> > Thanks M$ you guys take the cake on this one:)
>> >
>> > /END Thread
>> > Z
>> >
>> > Edward E. Ziots
>> > Network Engineer
>> > Lifespan Organization
>> > MCSE,MCSA,MCP,Security+,Network+,CCA
>> > Phone: 401-639-3505
>> >
>> > -----Original Message-----
>> > From: Ken Schaefer [mailto:[EMAIL PROTECTED]
>> > Sent: Sunday, October 26, 2008 8:49 PM
>> > To: NT System Admin Issues
>> > Subject: RE: Out of Cycle Critical Windows Patch ?
>> >
>> > Um, not sure what you are saying here...
>> >
>> > Are you saying that because there are unauthenticated ways of calling
>> > the Server service, then Microsoft needs to review all the pieces of
>> > code that the server service calls, even if they aren't part of the
>> > server service itself?
>> >
>> > (FWIW Windows Server 2008 and Vista require authentication by default
>> to
>> > the server service, so there's one fix).
>> >
>> > I know they are doing code reviews, but as per the SDL blog, this
>> > particular issue in netapi32.dll is a particularly different one to
>> fix.
>> >
>> > Cheers
>> > Ken
>> >
>> > > -----Original Message-----
>> > > From: Ziots, Edward [mailto:[EMAIL PROTECTED]
>> > > Sent: Monday, 27 October 2008 11:44 AM
>> > > To: NT System Admin Issues
>> > > Subject: RE: Out of Cycle Critical Windows Patch ?
>> > >
>> > > Yean pretty aware that netapi32.dll is called by a lot of items,
>> which
>> > > sends the attack vector up quite a bit, but the server service was
>> the
>> > > route into both if memory serves me right, so question is why did
>> > > another unauthenticated RPC error attack with that service as the
>> > route
>> > > happen again when they made a fix for a similar vulnerability 2+ yrs
>> > > ago..
>> > >
>> > > Z
>> > >
>> > > Edward E. Ziots
>> > > Network Engineer
>> > > Lifespan Organization
>> > > MCSE,MCSA,MCP,Security+,Network+,CCA
>> > > Phone: 401-639-3505
>> > > -----Original Message-----
>> > > From: Ken Schaefer [mailto:[EMAIL PROTECTED]
>> > > Sent: Sunday, October 26, 2008 6:50 PM
>> > > To: NT System Admin Issues
>> > > Subject: RE: Out of Cycle Critical Windows Patch ?
>> > >
>> > > Hmm - I check MS06-040 again, and I don't think they are the same
>> > "type"
>> > > of issue.
>> > >
>> > > The current bug is in the NetCanonicalize API - not in the Server
>> > > service. It's just that the server service is a route to get to that
>> > bug
>> > > - because it calls that API. But it's entirely possible for /other/
>> > > applications to also call that API. Just use Process Explorer, and
>> see
>> > > how many applications are using Netapi32.dll - I think you'll find
>> > it's
>> > > a lot. Any of these /might/ also call that API, and become a vector
>> > for
>> > > compromise.
>> > >
>> > > Cheers
>> > > Ken
>> > >
>> > > > -----Original Message-----
>> > > > From: Ken Schaefer [mailto:[EMAIL PROTECTED]
>> > > > Sent: Monday, 27 October 2008 9:28 AM
>> > > > To: NT System Admin Issues
>> > > > Subject: RE: Out of Cycle Critical Windows Patch ?
>> > > >
>> > > > According to the SDL blog, this is why this particular issue is
>> not
>> > > easy to
>> > > > discover, especially using automated analysis:
>> > > > http://blogs.msdn.com/sdl/archive/2008/10/22/ms08-067.aspx
>> > > >
>> > > > Cheers
>> > > > Ken
>> > > >
>> > > > > -----Original Message-----
>> > > > > From: Ziots, Edward [mailto:[EMAIL PROTECTED]
>> > > > > Sent: Monday, 27 October 2008 12:45 AM
>> > > > > To: NT System Admin Issues
>> > > > > Subject: RE: Out of Cycle Critical Windows Patch ?
>> > > > >
>> > > > > Yeah someone lit a fire under MSFT arse and they got with the
>> > > program on
>> > > > > this one, but only after they detected systems getting exploited
>> > in
>> > > the
>> > > > > wild. Why they didn't determine this flaw back when they patched
>> > > 06-040
>> > > > > for the same type of issue we probably will never know...
>> > > > >
>> > > > > Z
>> > > > >
>> > > > > Edward E. Ziots
>> > > > > Network Engineer
>> > > > > Lifespan Organization
>> > > > > MCSE,MCSA,MCP,Security+,Network+,CCA
>> > > > > Phone: 401-639-3505
>> > > > >
>> > > > > -----Original Message-----
>> > > > > From: Kurt Buff [mailto:[EMAIL PROTECTED]
>> > > > > Sent: Friday, October 24, 2008 8:08 PM
>> > > > > To: NT System Admin Issues
>> > > > > Subject: Re: Out of Cycle Critical Windows Patch ?
>> > > > >
>> > > > > Taking this in a slightly different direction...
>> > > > >
>> > > > > I told the IT Director and COO yesterday that I was patching all
>> > > > > servers, and sending an email to all of the laptop users to do
>> the
>> > > > > same.
>> > > > >
>> > > > > They were a bit skeptical, but not only did the emails that I
>> > > > > forwarded them from various lists buttress my opinion, this
>> > morning
>> > > I
>> > > > > got forwarded a voicemail by the IT Director, from a rep at
>> MSFT.
>> > > Gist
>> > > > > of the message - MSFT is taking this extremely seriously, and
>> you
>> > > > > should patch now.
>> > > > >
>> > > > > Director's comments was "nice job, good of you to jump on this."
>> > > > >
>> > > > > Anyone else get a call like this from MSFT? It's the first time
>> > I've
>> > > > > heard of them doing this, and I take it as a really good sign -
>> > MSFT
>> > > > > is finally getting the real clue about this stuff.
>> > > > >
>> > > > > Kurt
>> > > > >
>> > > > > On Fri, Oct 24, 2008 at 3:52 AM, Oliver Marshall
>> > > > > <[EMAIL PROTECTED]> wrote:
>> > > > > > Chaps,
>> > > > > >
>> > > > > > The update that was sent out last night, has that caused any
>> > > issues
>> > > > > > elsewhere? We've had a spate of calls from users about
>> problems
>> > > today,
>> > > > > > several servers which were set to auto-update for various
>> > reasons
>> > > have
>> > > > > > had varying levels of failure. It's mentally busy here for a
>> > > Friday,
>> > > > > and
>> > > > > > the one thing they have in common is that all the machine
>> > rebooted
>> > > for
>> > > > > > an update last night.
>> > > > > >
>> > > > > > Is it just us ?
>> > > >
>> > > >
>> > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > > > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> > >
>> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> > >
>> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >
>> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> >
>> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to