IMPORTANT Out-of-band Windows Security Update just released
Vulnerability in the Server service may cause a specially crafted RPC request to give an attacker full control of your computer. This sounds very similar to the vulnerability that the Blaster worm exploited a few years ago. Download it now, test, and deploy!
http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx
http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx
IT guy since 12/00
Recent: 11/2019 - RHCSA (RHEL 7); 2/2019 - Updated VCP to 6.5 (just a few days before VMware discontinued the re-cert policy...)
Working on: RHCE/Ansible
Future: Probably continued Red Hat Immersion, Possibly VCAP Design, or maybe a completely different path. Depends on job demands...
Recent: 11/2019 - RHCSA (RHEL 7); 2/2019 - Updated VCP to 6.5 (just a few days before VMware discontinued the re-cert policy...)
Working on: RHCE/Ansible
Future: Probably continued Red Hat Immersion, Possibly VCAP Design, or maybe a completely different path. Depends on job demands...
Comments
-
Claymoore Member Posts: 1,637Thanks for the heads up blargoe.
My WSUS server downloaded the update during last night's synchronization, so those of you running WSUS may already be protected if you automatically approve security updates. -
HeroPsycho Inactive Imported Users Posts: 1,940Script to audit your computers in a listfile in a nice Excel spreadsheet. Requires PowerShell and Excel on the box you launch the script:
$cred = Get-Credential ""
$ErrorActionPreference = "SilentlyContinue"
$a = New-Object -comobject Excel.Application
$a.visible = $True
$b = $a.Workbooks.Add()
$c = $b.Worksheets.Item(1)
$c.Cells.Item(1,1) = "Machine Name"
$c.Cells.Item(1,2) = "PatchStatus"
$c.Cells.Item(1,3) = "Report Time Stamp"
$d = $c.UsedRange
$d.Interior.ColorIndex = 19
$d.Font.ColorIndex = 11
$d.Font.Bold = $True
$intRow = 2
foreach ($strComputer in get-content C:\computers.txt)
{
$c.Cells.Item($intRow,1) = $strComputer
$PatchStatus = Get-WMIObject Win32_QuickFixEngineering -computer $strcomputer -credential $cred | where {$_.HotFixID -eq "KB958644"}
if($PatchStatus -eq $Null)
{
$c.Cells.Item($intRow,2).Interior.ColorIndex = 3
$c.Cells.Item($intRow,2) = "NO"
}
else
{
$c.Cells.Item($intRow,2).Interior.ColorIndex = 4
$c.Cells.Item($intRow,2) = "YES"
}
$c.Cells.Item($intRow,3) = Get-Date
$intRow = $intRow + 1
}
$d.EntireColumn.AutoFit()
clsGood luck to all! -
royal Member Posts: 3,352 ■■■■□□□□□□And where'd you get that from or did you make it?“For success, attitude is equally as important as ability.” - Harry F. Banks
-
HeroPsycho Inactive Imported Users Posts: 1,940Your mom.
OHHHHHHHHHHHHHHHH SNAAAAAAAAAAAAAAAAAAAAAAAAAAAP!
Edit: http://myitforum.com/cs2/blogs/yli628/archive/2007/05/03/powershell-script-to-check-if-a-particular-patch-installed.aspxGood luck to all! -
royal Member Posts: 3,352 ■■■■□□□□□□MyITForum is pretty good for scripts. I have this PS Scripting Repository bookmarked:
http://www.myitforum.com/myITWiki/Default.aspx?Page=WPScripts&AspxAutoDetectCookieSupport=1“For success, attitude is equally as important as ability.” - Harry F. Banks -
astorrs Member Posts: 3,139 ■■■■■■□□□□My client has pushed it to ~40,000 systems and they are all rebooting tonight (include a few thousand servers) - quite the event actually.
-
blargoe Member Posts: 4,174 ■■■■■■■■■□We have it fully deployed now. No issues.IT guy since 12/00
Recent: 11/2019 - RHCSA (RHEL 7); 2/2019 - Updated VCP to 6.5 (just a few days before VMware discontinued the re-cert policy...)
Working on: RHCE/Ansible
Future: Probably continued Red Hat Immersion, Possibly VCAP Design, or maybe a completely different path. Depends on job demands...