Seaside Helps Shutdown the MSBlaster Worm!

M

Mem

Seaside Helps Shutdown the MSBlaster Worm!


Internet Worm Shuts Out Email Users

On Monday, August 11th, a new worm was discovered infecting machines across
the Internet. The worm is spreading rapidly by exploiting a Microsoft
Windows DCOM RPC vulnerability. The worm spreads itself by attacking port
135, the port used by Outlook Exchange clients to connect to Microsoft
Exchange servers.



In an effort to stop the spread of the worm, many organizations, including
numerous ASPs and ISPs, have shutdown Internet access to port 135.
Unfortunately, this also shuts down Outlook clients using MAPI to connect
the Exchange server and has deprived thousands of users of their email
connectivity.





HiPerExchange Securely and Safely Delivers Email

Throughout the crisis, HiPerExchange users continue to run their mail,
unaffected by the worm. HiPerExchange is a web-based Exchange client that
delivers the benefits of Outlook (synched, offline Folders) from within the
convenience of a browser. HiPerExchange merely requires HTTP/S access and
thus is not affected by the availability of port 135 on Exchange servers.



HiPerExchange users do not put critical Exchange servers at risk by
requiring that vulnerable RPC ports be exposed to attackers, nor does it
require a large, complex VPN infrastructure.





To learn more about HiPerExchange and how it can help you today, contact
Seaside at (e-mail address removed).
 
L

Lanwench [MVP - Exchange]

It isn't the port that sensible admins allow Outlook to access Exchange
through, however. The networks with those ports open (and unpatched
machines) were hit hard. People need to get the clue and start implementing
more secure methods of mail access for remote users.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top