Here is a list of affected operating systems:
- Windows 2000 Server Service Pack 4
- Windows Server 2003 Service Pack 1
- Windows Server 2003 Service Pack 2
The best advise from Microsoft on this issue at the moment is to disable RPC capability for DNS servers by changing a registry value. From Microsoft's advisory:
- On the start menu click 'Run' and then type 'Regedit' and then press enter.
- Navigate to the following registry location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters
- On the 'Edit' menu select 'New' and then click 'DWORD Value'
- Where 'New Value #1' is highlighted type 'RpcProtocol' for the name of the value and then press enter.
- Double click on the newly created value and change the value's data to '4' (without the quotes).
- Restart the DNS service for the change to take effect.
And you should make sure you are blocking all unsolicited traffic on ports over 1024. In fact, you should block all unsolicited incoming traffic period. Use personal firewalls on individual machines and gateway firewalls between your machines and the Internet.
No comments:
Post a Comment