dslreports logo
 
    All Forums Hot Topics Gallery
spc
Search similar:


uniqs
351

JmanB
Premium Member
join:2003-08-27
Redmond, WA

2 recommendations

JmanB

Premium Member

Malicious activity relating to MS04-011

What is this alert?

- Microsoft is aware of code available on the Internet that seeks to exploit vulnerabilities addressed as part of our April 13th security updates. We are investigating the situation to help protect our customers. Specifically, the reports detail exploit code that attempts to use the IIS PCT/SSL vulnerability on servers running Internet Information Services with the Secure Socket Layer authentication enabled. This vulnerability is addressed by bulletin MS04-011. Customers who have deployed MS04-011 are not at risk from this exploit code.

- Microsoft considers these reports credible and serious and continues to urge all customers to immediately install the MS4-011 update as well as the other critical updates provided on April 13th.

- Customers who are still evaluating and testing MS04-011 should immediately implement the workaround steps detailed for the PCT/SSL vulnerability detailed in the MS04-011. In addition, Microsoft has published a knowledge base article KB187498 at »support.microsoft.com/de ··· s;187498 which provides additional details on SSL and how to disable PCT without applying MS04-011.

- We expect to see additional exploits and proof-of-concept code targeting the April 2004 security bulletin release in coming days and weeks, potentially including worm or virus examples.

If you have any questions regarding the security updates or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety (1-866-727-2338). International customers should contact their local subsidiary.

Thank you,
Microsoft PSS Security Team
JmanB

JmanB

Premium Member

We have also issued information containing mitigation steps (these are in the security bulletin as well) for customers who have not been able to deploy the patch yet:

»www.microsoft.com/securi ··· able.asp