* Windows NT 4.0(Windows 95/98/Me computers are not at risk.)
* Windows NT 4.0 Terminal Services Edition
* Windows XP
* Windows Server 2003
If you see the messages "svchost.exe error" or "The RPC process has terminated unexpectedly" or if your Windows XP computer reboots itself automatically, your computer may already be infected.
For your convenience, I have included links to Microsoft's download sites for you to download and apply the patch if you want to apply it yourself. Otherwise contact me to schedule a time for me to apply the patch. (This patch requires a reboot of the computer once it is applied.)
Windows NT 4.0 - Download Patch | |
from Microsoft | from MK Networking |
Windows 2000 - Download Patch | |
from Microsoft | from MK Networking |
Windows XP - Download the Patch | |
from Microsoft | from MK Networking |
Windows 2003 Server - Download Patch | |
from Microsoft | from MK Networking |
This vulnerability can also be fixed using Windows Update.
This vulnerability and the patch is discussed in detail in the following Microsoft Knowledge Base bulletin - "Q823980 - MS03-026: Buffer Overrun in RPC Interface May Allow Code Execution"
Read what Microsoft has to say about this problem and the patch at http://www.microsoft.com/technet/security/bulletin/MS03-026.asp