Microsoft SMB Service (MS09-001)

FNAL Critical Vulnerability
Platform: Microsoft Windows 2000, Windows XP, Windows Server 2003, Vista
Product: MS09-001 SMB Remote Code Execution (958687)
Exploitation: Unauthenticated users may execute arbitrary code through malformed SMB packets
Patch URL: FNAL SMS, FNAL WSUS, http://www.microsoft.com/technet/security/bulletin/ms09-001.mspx
Declaration date: January 14, 2009
Patch By: Wednesday, January 21, 2009 (date may be moved up if public exploits become widespread)

A vulnerability has been discovered in the Microsoft SMB service (service that manages SMB connections such as file shares and printer sharing) allowing an attacker to send a malformed request and execute arbitrary code. While there are currently no reports of active exploits in the wild, a public release exploit is probably not far off. While FNAL does have various levels on mitigations in place from an outside attack, vulnerability avenues do exist. All affected Windows systems must be patched by Wednesday, January 21, 2009. Note that if exploits become public or widespread, this date will be moved up as required.
Microsoft reference URL:
http://www.microsoft.com/technet/security/bulletin/ms09-001.mspx

* Note that patches should automatically be applied by your desktop support staff through normal patching mechanisms. As a last resort, you can also visit Windows Update to have the patches applied, or visit the Microsoft URL above and manually download/install the patch for your operating system.

For assistance contact helpdesk@fnal.gov.
Information compiled and maintained by Computer Security Team ; last modified by JK on Oct 23, 2008.
(Address comments about page to the Computer Security Team.)