Please run windows update now

Karl Auer kauer at biplane.com.au
Sat May 13 00:58:29 UTC 2017


On Fri, 2017-05-12 at 10:30 -0800, Royce Williams wrote:
> - In parallel, consider investigating low-hanging fruit by OU
> (workstations?) to disable SMBv1 entirely.

Kaspersky reckons the exploit applies to SMBv2 as well:

https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in
-widespread-attacks-all-over-the-world/

I thought it was a typo in para 2 and the table, but they emailed back
saying nope, SMBv2 is (was) also broken. However, they also say (same
page) that the MS patch released in March this year fixes it.

Assuming they are right, I wonder why Microsoft didn't mention SMBv2?

Regards, K.

-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Karl Auer (kauer at biplane.com.au)
http://www.biplane.com.au/kauer
http://twitter.com/kauer389

GPG fingerprint: A52E F6B9 708B 51C4 85E6 1634 0571 ADF9 3C1C 6A3A
Old fingerprint: E00D 64ED 9C6A 8605 21E0 0ED0 EE64 2BEE CBCB C38B




More information about the NANOG mailing list