As of a few moments ago the Executive Summary included your information
Executive Summary:
A worm has started spreading early afternoon EDT (evening UTC Time) and
is expected to continue spreading rapidly. This worms exploits the
Microsoft Windows DCOM RPC Vulnerability announced July 16,
must be fun out there on the net today. one minute of counter
accumulation
deny tcp any any eq 135 (5721 matches)
deny tcp any any eq 137
deny tcp any any eq 138
deny tcp any any eq 139 (17 matches)
deny tcp any any eq 445 (1137 matches)
randy
I've seen similar behavior. I patch immediately and religiously, and on
two of my patched boxes I've seen unusual svchost crashes yesterday and
today. But no infection, knock on wood.
Bob German
Sr Systems Engineer
Irides, LLC
-Original Message-
From: [EMAIL PROTECTED]
Sean Donelan wrote:
http://computerworld.co.nz/webhome.nsf/UNID/BEC6DE12EC6AE16ECC256D8000192BF7!opendocument
While some end users are calling for ISPs to block certain ports relating
to the Microsoft exploit as reported yesterday (Feared RPC worm starts to
spread), most ISPs are reluctant to do