[THIN] Re: MS03-049 on Citrix MF FR2 W2k

  • From: "Rowlandson, John" <John.Rowlandson@xxxxxxxxxxxxx>
  • To: <thin@xxxxxxxxxxxxx>
  • Date: Fri, 14 Nov 2003 10:17:40 +1100

Mallesons Stephen Jaques
www.mallesons.com

Confidential communication

 
 
running on my dev servers no probs so far
 

John Rowlandson
Technical Support Specialist
Mallesons Stephen Jaques
Sydney
T +61 2 9296 3653
F +61 2 9296 3999
john.rowlandson@xxxxxxxxxxxxx


-----Original Message-----
From: thin-bounce@xxxxxxxxxxxxx [mailto:thin-bounce@xxxxxxxxxxxxx]On Behalf Of 
Stratton, Doug MSER:EX
Sent: Friday, 14 November 2003 6:55 AM
To: 'thin@xxxxxxxxxxxxx'
Subject: [THIN] MS03-049 on Citrix MF FR2 W2k



Hello 
Just wanted to check with the list to see if anyone has deployed this patch and 
if so any problems. 

Anyone try the workaround where they block the ports: 
Block UDP ports 138, 139, 445 and TCP ports 138, 139, 445 at your firewall. 
These ports are used to accept a Remote Procedure Call (RPC) connection at a 
remote computer. Blocking them at the firewall will help prevent systems behind 
that firewall from being attacked by attempts to exploit this vulnerability. 

Or Disable the Workstation service.   (I am assuming this is defiantly a no go) 

Other related posts: