Is there a script out there to move contacts entered in a specific OU
and different distribution groups to EXCH's Public Folders? 
It's a weird request by a client!

Alex

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Alex Alborzfard
Sent: Tuesday, August 29, 2006 2:43 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Microsoft Security Bulletin MS06-041
Vulnerability in DNS Resolution Could Allow Remote Code Execution

Oddly enough today we got hit by a virus(worm actually) that had
exploited
MS-06-040 vulnerability. Our AV (Trend) didn't catch it in time. 
Though I brought it up to my boss & fellow Admins' attention
more than 2 weeks ago, they decided to ignore it! 
We ended up going around with the helpdesk team to clean the mess up. 
I'm sure it'll be swept under the rug! 

Alex

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley,
CPA aka Ebitz - SBS Rocks [MVP]
Sent: Friday, August 11, 2006 1:05 PM
To: ActiveDir@mail.activedir.org
Subject: Re: [ActiveDir] Microsoft Security Bulletin MS06-041
Vulnerability in DNS Resolution Could Allow Remote Code Execution

..and plant that flag and get it raised.

You cannot protect what is not managed.

Alex Alborzfard wrote:
> Yes I'm aware of both tools. WSUS requires dedicated server and
> configuration.
> MBSA doesn't list installed patches, date of application, versions,
etc.
> It basically tells you what is missing.
> I was talking about a tool that I can run from my PC, which I have
used
> in the past. I think you could also remove the patch or roll it back
> right from the interface. For some reason I thought it was Windows
> Defender, but I installed it and it doesn't have that capability.
>
> No I'm not managing patching in our networks...well not yet anyway!
> I'm just trying to raise the flags, so to speak.
>
> Alex
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Susan
Bradley,
> CPA aka Ebitz - SBS Rocks [MVP]
> Sent: Friday, August 11, 2006 11:53 AM
> To: ActiveDir@mail.activedir.org
> Subject: Re: [ActiveDir] Microsoft Security Bulletin MS06-041
> Vulnerability in DNS Resolution Could Allow Remote Code Execution
>
> E-Bitz - SBS MVP the Official Blog of the SBS "Diva" : The threats and

> risk level today:
> http://msmvps.com/blogs/bradley/archive/2006/08/10/107303.aspx
>
>
> Alun's "Holy Crap" post:
> Tales from the Crypto : How do I rate today's patches?:
> http://msmvps.com/blogs/alunj/archive/2006/08/08/107097.aspx
>
>
> MBSA  -http://www.microsoft.com/technet/security/tools/mbsahome.mspx
>
> WSUS - 
>
http://www.microsoft.com/windowsserversystem/updateservices/default.mspx
>
> You are managing patching in your networks now right?
>
> Alex Alborzfard wrote:
>   
>> Thanks John this is really helpful, though only for this
>>     
> vulnerability.
>   
>> Alex
>>
>> -----Original Message-----
>> From: [EMAIL PROTECTED]
>> [mailto:[EMAIL PROTECTED] On Behalf Of John Singler
>> Sent: Friday, August 11, 2006 11:22 AM
>> To: ActiveDir@mail.activedir.org
>> Subject: Re: [ActiveDir] Microsoft Security Bulletin MS06-041
>> Vulnerability in DNS Resolution Could Allow Remote Code Execution
>>
>> For MS06-040 you can use the tool from eeye.com to ID vulnerable
>> machines:
>>
>> http://www.eeye.com/html/resources/downloads/audits/NetApi.html
>>
>> Alex Alborzfard wrote:
>>   
>>     
>>> What about MS06-040? I've heard it's a nasty one like blaster.
>>> DHS has already issued a recommendation to apply this patch.
>>>
>>> I remember using a utility tool that would list all applied patches
>>>       
> on
>   
>>>     
>>>       
>> a
>>   
>>     
>>> Windows box with all kind of information.
>>> Anyone has ever used or knows anything about it?
>>>
>>> Alex
>>> -----Original Message-----
>>> From: [EMAIL PROTECTED]
>>> [mailto:[EMAIL PROTECTED] On Behalf Of Susan
>>>     
>>>       
>> Bradley,
>>   
>>     
>>> CPA aka Ebitz - SBS Rocks [MVP]
>>> Sent: Tuesday, August 08, 2006 1:55 PM
>>> To: ActiveDir@mail.activedir.org
>>> Subject: [ActiveDir] Microsoft Security Bulletin MS06-041
>>>     
>>>       
>> Vulnerability
>>   
>>     
>>> in DNS Resolution Could Allow Remote Code Execution
>>>
>>> One of 12 today...but since it's DNS related
>>>
>>> Microsoft Security Bulletin MS06-041 Vulnerability in DNS Resolution

>>> Could Allow Remote Code Execution (920683):
>>> http://www.microsoft.com/technet/security/Bulletin/MS06-041.mspx
>>>
>>> For an attack to be successful the attacker would either have to be
>>>       
> on
>   
>>>     
>>>       
>> a
>>   
>>     
>>> subnet between the host and the DNS server or force the target host
>>>       
> to
>   
>>>     
>>>       
>>   
>>     
>>> make a DNS request to receive a specially crafted record response
>>>       
> from
>   
>>>     
>>>       
>>   
>>     
>>> an attacking server.
>>>
>>> (and Brett...just a FYI... in my twig forest... any attacker that
>>>       
> ends
>   
>>>     
>>>       
>>   
>>     
>>> up on a subnet between a host and my DNS server [aka the Kitchen
sink
>>>       
>
>   
>>> service server] ... that attacker is dead meat and has a 2x4 aimed
>>>       
> his
>   
>>>     
>>>       
>>   
>>     
>>> way... one advantage of being little)
>>>
>>> Your patch folks may be calling up you AD guys for testing passes.
>>>
>>> Workarounds:
>>>
>>> *Block DNS related records at network gateways*
>>>
>>> Blocking the following DNS record types at network gateways will
help
>>>       
>
>   
>>> protect the affected system from attempts to exploit this
>>>     
>>>       
>> vulnerability.
>>   
>>     
>>> *   
>>>
>>> ATMA
>>>
>>> *   
>>>
>>> TXT
>>>
>>> *   
>>>
>>> X25
>>>     
>>>       
>> List info   : http://www.activedir.org/List.aspx
>> List FAQ    : http://www.activedir.org/ListFAQ.aspx
>> List archive: http://www.activedir.org/ml/threads.aspx
>> List info   : http://www.activedir.org/List.aspx
>> List FAQ    : http://www.activedir.org/ListFAQ.aspx
>> List archive: http://www.activedir.org/ml/threads.aspx
>>
>>   
>>     
>
>   

-- 
Letting your vendors set your risk analysis these days?  
http://www.threatcode.com

If you are a SBSer and you don't subscribe to the SBS Blog... man ... I
will hunt you down...
http://blogs.technet.com/sbs

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx

Reply via email to