module inscription newsletter haut de page forum mobile

Rejeter la notice

formations etalonnage sur davinci resolve

Nos Formations Etalonnage avec Forest reviennent en octobre !
Adoptez une réelle méthodologie d'étalonnage professionnelle et atteignez vos objectifs créatifs avec nos formations intensives sur 3 jours
Toutes les infos
Rejeter la notice

Formation Lumière - Pratique Intensive du 14 au 16 octobre à Paris
Formez-vous avec cet atelier de pratique intensive dans des conditions exceptionnelles ! Formation finançable.
Toutes les infos

Ateliers et Formations

Redémarrage du PC en connexion internet

Discussion dans 'Informatique et vidéo' créé par Lacer, 12 Août 2003.

Tags:
  1. Lacer

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    417
    Appréciations:
    +0 / 0 / -0
    Bonsoir,

    Ce topic n'est pas lié à la vidéo, mais il empêche au moins un repairenaute (NoëlNONO) d'aller sur le repaire. je pensais que son problème pouvait être lié à son disque qui avait eu des soucis, mais ce soir quelqu'un m'a appelé pour le même problème.

    Je vais aller chercher sur des forums informatique, mais quelqu'un ici a peut être déjà la réponse.

    Le problème : ils sont sous Win XP et après quelques minutes de connexion internet (repaire ou autres sites) un message s'affiche (je n'ai pas le message exact : initié par autorité NT/system, windows doit redémarrer car le serveur appel de la RPC s'est terminé de façon inattendue) et le PC redémarre. Aucun soucis en montage sous première.
    Ils ont eu ce problème à peu près en même temps. J'ai l'impression que c'est un correctif de XP qui fiche le bazar car Noël venait de faire un "windowsupdate"


    Si je trouve des infos, je reviens car je pense que d'autres vont avoir le même soucis.

    @+
     
  2. poulperouge

    poulperouge Conseiller Technique PC & vidéo

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    811
    Appréciations:
    +0 / 0 / -0
    VIRUS

    il s agit du virus W32 Blaster...:(
    il attaque la RPC de microsoft
    il faut utiliser un antivirus recent et patcher windows... desole mais la je n ais pas d autres renseignements ... je suis chez moi
     
  3. Lacer

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    417
    Appréciations:
    +0 / 0 / -0
    Merci Poulperouge,

    je viens de trouver l'info et j'allais la mettre. Il semble que peu d'anti-virus détectent ce ver, il y a un utilitaire chez symantec pour l'enlever ici

    J'appelle mes gaillards pour voir si c'est ça.

    Encore merci

    @+
     
  4. Hommer

    Points Repaire:
    100
    Recos reçues:
    0
    Messages:
    1
    Appréciations:
    +0 / 0 / -0
    je confirm 6 pote sont infecter
    bon courage
     
  5. Don vincenzo

    Don vincenzo Conseiller Technique PC & vidéo

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    883
    Appréciations:
    +0 / 0 / -0
    Oui c'est la saloperie du jour :col: !!

    DV
     
  6. Danbar

    Points Repaire:
    550
    Recos reçues:
    0
    Messages:
    16
    Appréciations:
    +0 / 0 / -0
    Oui, ça semble trés à la mode ces jours-ci.

    Personnellement, je ne suis pas encore touché.

    Essayer d'aller sur ce site, ça peut peut-etre aider certains.

    http://telecharger.clubic.com/n/n9634.html

    Danbar.
     
  7. Lacer

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    417
    Appréciations:
    +0 / 0 / -0
    Un peu plus d'infos.

    A priori, on se prend ce ver au hasard (scan des adresses IP), c'est une attaque sur le port 135 de TCP, en installant le patch sur la page indiquée par Danbar, on se protège.

    Avant de lancer l'outil de symantec, désactiver la restauration system de XP.

    @+
     
  8. valek

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    751
    Appréciations:
    +0 / 0 / -0
    Mouai, enfin avec un bon firewall et un antivirus à jour ça dois pas trop pozé de pb ? :D
     
  9. poulperouge

    poulperouge Conseiller Technique PC & vidéo

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    811
    Appréciations:
    +0 / 0 / -0
    pour ceux qui lisent l anglais ....

    -----BEGIN PGP SIGNED MESSAGE-----

    CERT Advisory CA-2003-20 W32/Blaster worm

    Original issue date: August 11, 2003
    Last revised: --
    Source: CERT/CC

    A complete revision history is at the end of this file.

    Systems Affected

    * Microsoft Windows NT 4.0
    * Microsoft Windows 2000
    * Microsoft Windows XP
    * Microsoft Windows Server 2003

    Overview

    The CERT/CC is receiving reports of widespread activity related to a
    new piece of malicious code known as W32/Blaster. This worm appears to
    exploit known vulnerabilities in the Microsoft Remote Procedure Call
    (RPC) Interface.

    I. Description

    The W32/Blaster worm exploits a vulnerability in Microsoft's DCOM RPC
    interface as described in VU#568148 and CA-2003-16. Upon successful
    execution, the worm attempts to retrieve a copy of the file
    msblast.exe from the compromising host. Once this file is retrieved,
    the compromised system then runs it and begins scanning for other
    vulnerable systems to compromise in the same manner. In the course of
    propagation, a TCP session to port 135 is used to execute the attack.
    However, access to TCP ports 139 and 445 may also provide attack
    vectors and should be considered when applying mitigation strategies.
    Microsoft has published information about this vulnerability in
    Microsoft Security Bulletin MS03-026.

    Lab testing has confirmed that the worm includes the ability to launch
    a TCP SYN flood denial-of-service attack against windowsupdate.com. We
    are investigating the conditions under which this attack might
    manifest itself. Unusual or unexpected traffic to windowsupdate.com
    may indicate an infection on your network, so you may wish to monitor
    network traffic.

    Sites that do not use windowsupdate.com to manage patches may wish to
    block outbound traffic to windowsupdate.com. In practice, this may be
    difficult to achieve, since windowsupdate.com may not resolve to the
    same address every time. Correctly blocking traffic to
    windowsupdate.com will require detailed understanding of your network
    routing architecture, system management needs, and name resolution
    environment. You should not block traffic to windowsupdate.com without
    a thorough understanding of your operational needs.

    We have been in contact with Microsoft regarding this possibility of
    this denial-of-service attack.

    II. Impact

    A remote attacker could exploit these vulnerabilities to execute
    arbitrary code with Local System privileges or to cause a
    denial-of-service condition.

    III. Solutions

    Apply patches

    All users are encouraged to apply the patches referred to in Microsoft
    Security Bulletin MS03-026 as soon as possible in order to mitigate
    the vulnerability described in VU#568148. These patches are also
    available via Microsoft's Windows Update service.

    Systems running Windows 2000 may still be vulnerable to at least a
    denial-of-service attack via VU#326746 if their DCOM RPC service is
    available via the network. Therefore, sites are encouraged to use the
    packet filtering tips below in addition to applying the patches
    supplied in MS03-026.

    It has been reported that some affected machines are not able to stay
    connected to the network long enough to download patches from
    Microsoft. For hosts in this situation, the CERT/CC recommends the
    following:
    1. Physically disconnecting the system from the network
    2. Check the system for signs of compromise.
    + In most cases, an infection will be indicated by the presence
    of the registry key
    "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
    \Run\windows auto update" with a value of msblast.exe. If
    this key is present, remove it using a registry editor.
    3. If you're infected, terminate the running copy of msblast.exe
    using the Task Manager.
    4. Take one of the following steps to protect against the compromise
    prior to installing the Microsoft patch:
    + Disable DCOM as described below
    + Enabling Microsoft's Internet Connection Filter (ICF), or
    another host-level packet filtering program to block incoming
    connections for 135/tcp
    5. Reconnect the system to the network and apply the patches in the
    recommended manner

    Trend Micro, Inc. has published a set of steps to accomplish these
    goals. Symantec has also published a set of steps to accomplish these
    goals.

    Disable DCOM

    Depending on site requirements, you may wish to disable DCOM as
    described in MS03-026. Disabling DCOM will help protect against this
    vulnerability but may also cause undesirable side effects. Additional
    details on disabling DCOM and possible side effects are available in
    Microsoft Knowledge Base Article 825750.

    Filter network traffic

    Sites are encouraged to block network access to the following relevant
    ports at network borders. This can minimize the potential of
    denial-of-service attacks originating from outside the perimeter. The
    specific services that should be blocked include
    * 69/UDP
    * 135/TCP
    * 135/UDP
    * 139/TCP
    * 139/UDP
    * 445/TCP
    * 445/UDP
    * 4444/TCP

    Sites should consider blocking both inbound and outbound traffic to
    these ports, depending on network requirements, at the host and
    network level. Microsoft's Internet Connection Firewall can be used to
    accomplish these goals.

    If access cannot be blocked for all external hosts, the CERT/CC
    recommends limiting access to only those hosts that require it for
    normal operation. As a general rule, the CERT/CC recommends filtering
    all types of network traffic that are not required for normal
    operation.

    Because current exploits for VU#568148 create a backdoor, which is in
    some cases 4444/TCP, blocking inbound TCP sessions to ports on which
    no legitimate services are provided may limit intruder access to
    compromised hosts.

    Recovering from a system compromise

    If you believe a system under your administrative control has been
    compromised, please follow the steps outlined in

    Steps for Recovering from a UNIX or NT System Compromise

    Reporting

    The CERT/CC is tracking activity related to this worm as CERT#30479.
    Relevant artifacts or activity can be sent to cert@cert.org with the
    appropriate CERT# in the subject line.

    Appendix A. Vendor Information

    This appendix contains information provided by vendors. When vendors
    report new information, this section is updated and the changes are
    noted in the revision history. If a vendor is not listed below, we
    have not received their comments.

    Microsoft

    Please see Microsoft Security Bulletin MS03-026.

    Appendix B. References

    * CERT/CC Advisory CA-2003-19 -
    http://www.cert.org/advisories/CA-2003-19.html
    * CERT/CC Vulnerability Note VU#561284 -
    http://www.kb.cert.org/vuls/id/561284
    * CERT/CC Vulnerability Note VU#326746 -
    http://www.kb.cert.org/vuls/id/326746
    * Microsoft Security Bulletin MS03-026 -
    http://microsoft.com/technet/security/bulletin/MS03-026.asp
    * Microsoft Knowledge Base article 823980 -
    http://support.microsoft.com?kbid=823980

    Thanks

    Our thanks to Microsoft Corporation for their review of and input to
    this advisory.
    ______________________________________________________________________

    Authors: Chad Dougherty, Jeffrey Havrilla, Shawn Hernan, and Marty
    Lindner
    ______________________________________________________________________

    This document is available from:
    http://www.cert.org/advisories/CA-2003-20.html
    ______________________________________________________________________

    CERT/CC Contact Information

    Email: cert@cert.org
    Phone: +1 412-268-7090 (24-hour hotline)
    Fax: +1 412-268-6989
    Postal address:
    CERT Coordination Center
    Software Engineering Institute
    Carnegie Mellon University
    Pittsburgh PA 15213-3890
    U.S.A.

    CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
    EDT(GMT-4) Monday through Friday; they are on call for emergencies
    during other hours, on U.S. holidays, and on weekends.

    Using encryption

    We strongly urge you to encrypt sensitive information sent by email.
    Our public PGP key is available from
    http://www.cert.org/CERT_PGP.key

    If you prefer to use DES, please call the CERT hotline for more
    information.

    Getting security information

    CERT publications and other security information are available from
    our web site
    http://www.cert.org/

    To subscribe to the CERT mailing list for advisories and bulletins,
    send email to majordomo@cert.org. Please include in the body of your
    message

    subscribe cert-advisory

    * "CERT" and "CERT Coordination Center" are registered in the U.S.
    Patent and Trademark Office.
    ______________________________________________________________________

    NO WARRANTY
    Any material furnished by Carnegie Mellon University and the Software
    Engineering Institute is furnished on an "as is" basis. Carnegie
    Mellon University makes no warranties of any kind, either expressed or
    implied as to any matter including, but not limited to, warranty of
    fitness for a particular purpose or merchantability, exclusivity or
    results obtained from use of the material. Carnegie Mellon University
    does not make any warranty of any kind with respect to freedom from
    patent, trademark, or copyright infringement.
    ______________________________________________________________________

    Conditions for use, disclaimers, and sponsorship information

    Copyright 2003 Carnegie Mellon University.

    Revision History

    August 11, 2003: Initial release

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.5.8

    iQCVAwUBPzhJFGjtSoHZUTs5AQEO6wP5AZuyr1OG/U9RjZDAAatFmJUuTO8SFhtd
    R+nfZ54ylZPGE8ewMiS0hiuKaaXsOyk46R+zcwuPfoKffaaQX7SvwkS5uVzRBU+E
    PEnECSv6O8qL0uGR6BO8zmDncOhd8YouyXWGwMCRqpvH4rMHLRB8CIgKHyEoqBpl
    r69lGr8lqtE=
    =3GAW
    -----END PGP SIGNATURE-----
     
  10. Lacer

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    417
    Appréciations:
    +0 / 0 / -0
    Vive nos douaniers

    Il y a eu un flash ce midi à france 3 qui parlait de ce virus, mais le journaliste a été rassurant : le virus n'a pas encore traversé nos frontières, tiens comme le nuage de Tchernobyl. :lol: :lol: :lol:

    @+
     
  11. Lacer

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    417
    Appréciations:
    +0 / 0 / -0
    C'est vrai Monique, et en plus je l'avais lu, mais sûrement la fatigue je n'avais pas tilté. De plus mon PC passerelle internet est sous win 98, donc pas de problème.

    Merci pour tes news.

    @+
     
  12. valek

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    751
    Appréciations:
    +0 / 0 / -0
    Oui j'ai vu le journaliste aussi....... c'est lamentable.......:rolleyes:
     
  13. Djowant

    Points Repaire:
    100
    Recos reçues:
    0
    Messages:
    9
    Appréciations:
    +0 / 0 / -0
    Pareil... Ils perdent en crédibilité, avec ce genre de propos :rolleyes:
     
  14. poulperouge

    poulperouge Conseiller Technique PC & vidéo

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    811
    Appréciations:
    +0 / 0 / -0
    et attendez

    ce soir ca va etre repris en national sur la 2... generalement ils procedent comme ca:bravo:
     
  15. valek

    Points Repaire:
    1 000
    Recos reçues:
    0
    Messages:
    751
    Appréciations:
    +0 / 0 / -0
    :)

    Tiens j'ai un pote qui l'a choppé, on a été obligé d'utilisé son ghost (vive ghost) il pouvait ni installé le patch de ms, et le patch de symantec ne l'éradiquait pas :(

    De plus le systeme devenait super lent, genre processus utilisé a 100%.
     
Chargement...

Partager cette page