| Subject: Re: Calling networking specialists please... |
| From: gheston@hiwaay.net (Gary Heston) |
| Date: 03/09/2003, 03:05 |
In article <y505b.15215$%A3.1330927745@hestia.telenet-ops.be>,
Sharku <sharkuc@yahoo.com> wrote:
Roger Halstead <newsgroups@rogerhalstead.com> wrote:
With the first release of Windows NT 4.0, it appears. Haven't seen
any word that 3.51 was vulnerable (MS didn't have a patch for it, in
any case).
Hard to tell as MS no longer supports 3.**
Windows NT 3.51 and Windows 3.x are very different packages; NT 3.51
morphed into NT 4.0 which became NT 5.0/Windows 2000 which begat XP.
Windows 3.x was replaced by Windows 95 which became Windows 98 which
had bugs added to become Windows Millenium Edition. :-)
Same goes for 9x, they didn't test it, according to their security
bulletin.
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp
The MS03-26 patch page indicates that ME isn't affected, and I saw elsewhere
on their site while researching this for work that 9x wasn't affected. There
is no RPC service functionality in the 9x/ME family (or the older Win3.x
family) so no vulnerability.
I'm sure that if 9x was vulnerable, someone would've reported getting
infected, but I don't find it reassuring to know that they didn't even
bother to check on 95/98 as I'm sure there are still a lot more win 98's
out there than win 3.51's
Certainly, but there's no risk of this attack with 9x/ME. Or Linux, or BSD,
or Irix, or HPUX, or VMS, or a number of other operating systems.
Gary
39003 results returned
--
Gary Heston
gheston@hiwaay.net
Remember that the Patriot Act was written not by patriots, but by
politicians seeking votes and bureaucrats seeking power.