紧急通告DCOM RPC漏洞掀起蠕虫攻击狂潮

/ns/wz/otherwz/data/20030812191517.htm

于8月12日起,国内出现利用RPC漏洞进快速传播的蠕虫病毒,并命名为:“冲击波(新流言)”(Worm.MSblaster)。RPC漏洞会带来更大的危害,更强的传播性。事实上,在漏洞出现的时候就陆陆续续的出现了各种针对此漏洞的多种蠕虫病毒,早期的这些蠕虫病毒只是攻击此漏洞,造成远端系统的崩溃,而“新流言”的出现将漏洞的危害发挥到极致--它利用漏洞进行快速传播。我们有理由相信,在近一段时间内将会有更多类似的蠕虫病毒出现,将会掀起新一轮的蠕虫攻击狂潮。该漏洞会引起如此巨大的危害,是因为其应用的广泛性造成的,它会对x下列微软操作系统平台造成危害(简单点说就是除了9x/me外的所有的微软的操作系统)。

   Microsoft Windows 2000 Advanced Server SP4
   Microsoft Windows 2000 Advanced Server SP3
   Microsoft Windows 2000 Advanced Server SP2
   Microsoft Windows 2000 Advanced Server SP1
   Microsoft Windows 2000 Advanced Server
   Microsoft Windows 2000 Datacenter Server SP4
   Microsoft Windows 2000 Datacenter Server SP3
   Microsoft Windows 2000 Datacenter Server SP2
   Microsoft Windows 2000 Datacenter Server SP1
   Microsoft Windows 2000 Datacenter Server
   Microsoft Windows 2000 Professional SP4
   Microsoft Windows 2000 Professional SP3
   Microsoft Windows 2000 Professional SP2
   Microsoft Windows 2000 Professional SP1
   Microsoft Windows 2000 Professional
   Microsoft Windows 2000 Server SP4
   Microsoft Windows 2000 Server SP3
   Microsoft Windows 2000 Server SP2
   Microsoft Windows 2000 Server SP1
   Microsoft Windows 2000 Server
   Microsoft Windows NT Enterprise Server 4.0 SP6a
   Microsoft Windows NT Enterprise Server 4.0 SP6
   Microsoft Windows NT Enterprise Server 4.0 SP5
   Microsoft Windows NT Enterprise Server 4.0 SP4
   Microsoft Windows NT Enterprise Server 4.0 SP3
   Microsoft Windows NT Enterprise Server 4.0 SP2
   Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows NT Server 4.0 SP6a
   Microsoft Windows NT Server 4.0 SP6
   Microsoft Windows NT Server 4.0 SP5
   Microsoft Windows NT Server 4.0 SP4
   Microsoft Windows NT Server 4.0 SP3
   Microsoft Windows NT Server 4.0 SP2
   Microsoft Windows NT Server 4.0 SP1
   Microsoft Windows NT Server 4.0
   Microsoft Windows NT Terminal Server 4.0 SP6a
   Microsoft Windows NT Terminal Server 4.0 SP6
   Microsoft Windows NT Terminal Server 4.0 SP5
   Microsoft Windows NT Terminal Server 4.0 SP4
   Microsoft Windows NT Terminal Server 4.0 SP3
   Microsoft Windows NT Terminal Server 4.0 SP2
   Microsoft Windows NT Terminal Server 4.0 SP1
   Microsoft Windows NT Terminal Server 4.0
   Microsoft Windows NT Workstation 4.0 SP6a
   Microsoft Windows NT Workstation 4.0 SP6
   Microsoft Windows NT Workstation 4.0 SP5
   Microsoft Windows NT Workstation 4.0 SP4
   Microsoft Windows NT Workstation 4.0 SP3
   Microsoft Windows NT Workstation 4.0 SP2
   Microsoft Windows NT Workstation 4.0 SP1
   Microsoft Windows NT Workstation 4.0
   Microsoft Windows Server 2003 Datacenter Edition
   Microsoft Windows Server 2003 Datacenter Edition 64-bit
   Microsoft Windows Server 2003 Enterprise Edition
   Microsoft Windows Server 2003 Enterprise Edition 64-bit
   Microsoft Windows Server 2003 Standard Edition
   Microsoft Windows Server 2003 Web Edition
   Microsoft Windows XP 64-bit Edition SP1
   Microsoft Windows XP 64-bit Edition
   Microsoft Windows XP Home SP1
   Microsoft Windows XP Home
   Microsoft Windows XP Professional SP1
   Microsoft Windows XP Professional

   为了防范此漏洞带来的危害,请各位广大用户赶快为您的操作系统打上相应的修复补丁,下面是微软补丁的链接地址

   http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp

   如果,未能即时下载补丁的用户,请用防火墙禁用135、139、445端口,以免受到蠕虫的攻击。


20CN网络安全小组
2003-08-12
===============================================
本文版权属20CN网络安全小组及其作者所有,如有转载,请保持文章完整性并注明出处
文章类型:原创 提交:NetDemon 核查:NetDemon