Jump to content
Forumu Destekleyenlere Katılın ×
Paticik Forumları
2000 lerden beri faal olan, çok şukela bir paylaşım platformuyuz. Hoşgeldiniz.

helppp!! (acele)


jacabo

Öne çıkan mesajlar

ya bilg kafayı yeme moduna gırıyor bugun eve geldım actım bılgı ıste bı sure sonra bı program hatası verıyor wın32 de kapat dedıgın zaman shutdown baslıyor ıste herseyı kapatın 30 sn ıcınde restart olcak dıye sayıyor orda bu dosya cınkı aha sımdı yazaken cıktı son 50 sn yem yazıyım tam neler dedıgını

windowns must now restart because the remote procedure call(rpc) service terminated unexpectedly bu sefer o sey cıkmadan oldu[hline]
a$k bir sabunsa
köpürt beni pakize

Link to comment
Sosyal ağlarda paylaş

tam topic açmak için geldim ki ne göreyim! aynı sorun bende de vardı ama sanırım hallettim (sanırım diyorum çünkü emin değilim)
msconfig'i çalıştırın (başlat>çalıştır>msconfig) ve Başlangıç (Startup) sekmesi altında LXSUPMON ve ctfmon'u kaldırın.
Emin değilim ama işe yarayabilir.
Link to comment
Sosyal ağlarda paylaş

Arkadaşlar bugün herkes bu sorunu yasadi niyedir bilmiyorum ama cozumunu soyle buldum hemen anlatiyim.
Services larda remote proccesi bulun zaten kapatilamaz bir service recovery bölümüne girin orda restart bolumlerinin hepsini take no action yapin remote registry serviceinide stop edin.Ama makinede bazı programlari calistiramama sorunu yasayabilrsiniz

Ekleme:Microsoft Türkiye Güvenlik Acıklaması
http://www.microsoft.com/turkiye/guvenlik

[Bu mesaj vampirhuma tarafından 12 August 2003 00:30 tarihinde değiştirilmiştir]
Link to comment
Sosyal ağlarda paylaş

aaa kurtulunmuyor bundan. msblast.exe yi sildim ama hiçbirşey değişmedi.
Generic Host Process for Win32 Services bir sorunla karşılaştı ve kapatılması gerekiyor diyor ve sonra aynı şekilde geri sayım başlıyor. İmdaaaat...

[Bu mesaj Etos tarafından 12 August 2003 13:32 tarihinde değiştirilmiştir]
Link to comment
Sosyal ağlarda paylaş

Çözüm (kesin olmamakla birlikte):
Öncelikle Microsoft'un bu sorun için çıkardığı patch'i çekmelisiniz.
Türkçe için:
http://microsoft.com/downloads/details.aspx?displaylang=tr&FamilyID=2354406C-C5B6-44AC-9532-3DE40F69C074
İngilizce için:
http://support.microsoft.com/default.aspx?scid=kb;en-us;823980

Bu patch'i yükleyin ve bilgisayarı baştan başlatın. Hemen arkasından Symantec'in bu virüsü temizlemek için çıkardığı küçük programı yükleyin:
http://securityresponse.symantec.com/avcenter/FixBlast.exe

Ancak eğer Windows XP kullanıyorsanız bu programı çalıştırmadan önce sistem geri alma özelliğini kapatmanız gerekiyor. Kapatmazsanız program virüsten kurtulmasına rağmen bilgisayar baştan başladığında eski halde olur. Bunu da Başlat>Yardım ve Destek'ten yapabilirsiniz. Program msblast.exe ve bulaştığı dosyaları silecek ve bilgisayarı baştan başlatacaktır.

Bunlar sonucunda bu sorundan kurtulmuş olmanız gerekiyor. En azından ben kurtulmuş gibi gözüküyorum ama kesin de konuşmamak lazım =)
Link to comment
Sosyal ağlarda paylaş

işte size resmi açıklama ve çözüm önerileri çevirmek ile kasamadım üzgünüm
On Wednesday, July 16, 2003, Microsoft released a security bulletin and patch covering a vulnerability in Windows RPC. http://www.microsoft.com/technet/security/bulletin/MS03-026.asp.

This issue may generate questions among your peers and customers. Because Microsoft is committed to keeping customers' information safe, this e-mail provides additional information to help you address those questions. Microsoft updated this bulletin July 17 to provide customers with improved mitigation guidance. The patch issued July 16 is completely effective.

BACKGROUND
. Recently, a security research organization reported a critical vulnerability in the RPC component of the Windows operating system which could allow an attacker to execute code with Local System privileges.
. There are currently no known active exploits of this vulnerability.

WHAT WE'VE DONE
. Microsoft has analyzed the reported vulnerability and determined it represents a critical vulnerability.
. Microsoft issued security bulletin MS03-026 and released a patch which is now available via Microsoft's Download Center and Windows Update.

WHAT CUSTOMERS SHOULD DO
1. Microsoft strongly encourages all customers to download and apply the patch for the following affected operating systems:
. Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Services Edition, Windows 2000, Windows XP and Windows Server 2003.
2. In addition to applying the patch, in line with good security practices, customers should protect their networks through the use of a firewall.
. Best practices recommend blocking all TCP/IP ports that are not actually being used. For this reason, most machines attached to the Internet should have RPC over TCP or UDP blocked. RPC over UDP or TCP is not intended to be used in hostile environments such as the Internet.
. Consumers should use a personal firewall technology such as Internet Connection Firewall in Windows XP.

QUESTIONS AND ANSWERS
Q: How serious is this vulnerability?
A: Microsoft has rated this vulnerability "critical" which means that arbitrary code could potentially be executed without user intervention. However, at this time, it is only a vulnerability, no known public exploits exist, nor do we know of any customers who have been impacted.

TECHNICAL BACKGROUND
Technical description:
Microsoft originally released this bulletin and patch on July 16, 2003 to correct a security vulnerability in a Windows Distributed Component Object Model (DCOM) Remote Procedure Call (RPC) interface. The patch was and still is effective in eliminating the security vulnerability. However, the "mitigating factors" and "workarounds" discussions in the original security bulletin did not clearly identify all of the ports by which the vulnerability could potentially be exploited. We have updated this bulletin to more clearly enumerate the ports over which RPC services can be invoked, and to ensure that customers who have chosen to implement a workaround before installing the patch have the information that they need to protect their systems. Customers who have already installed the patch are protected from attempts to exploit this vulnerability, and need take no further action.

Remote Procedure Call (RPC) is a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly execute code on a remote system. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions.

There is a vulnerability in the part of RPC that deals with message exchange over TCP/IP. The failure results because of incorrect handling of malformed messages. This particular vulnerability affects a Distributed Component Object Model (DCOM) interface with RPC, which listens on TCP/IP port 135. This interface handles DCOM object activation requests that are sent by client machines (such as Universal Naming Convention (UNC) paths) to the server. An attacker who successfully exploited this vulnerability would be able to run code with Local System privileges on an affected system. The attacker would be able to take any action on the system, including installing programs, viewing changing or deleting data, or creating new accounts with full privileges.

To exploit this vulnerability, an attacker would need to send a specially formed request to the remote computer on specific RPC ports.

Mitigating factors:
. To exploit this vulnerability, the attacker would require the ability to send a specially crafted request to port 135, 139, or 445 or any other specifically configured RPC port on the remote machine. For intranet environments, these ports would normally be accessible, but for Internet connected machines, these would normally be blocked by a firewall. In the case where these ports are not blocked,
Link to comment
Sosyal ağlarda paylaş

×
×
  • Yeni Oluştur...