Thanks for the heads up! -=- Craig ----- Original Message ----- From: "Robert P. Goldman" <goldman at htc.honeywell.com> To: "Kelly Black" <kelly.black at penguinpackets.com>; <tclug-list at mn-linux.org> Sent: Tuesday, May 21, 2002 8:08 AM Subject: [TCLUG] firewall logs and Port 1433 > I believe I just saw something about this in the SANS NewsBites. Here > you go: > > http://www.incidents.org/diary/diary.php?id=152 > > An excerpt: > > Large scale MSSQL scans. > ================================================================ > ======================== > > For the last few days, we received a number of reports of widespread > scans of port 1433. The most common use of port 1433 is Microsoft's > SQL server. > > Just this march, a vulnerability in SQL Server 7.0 and 2000 was shown > to allow access to the the security context of the server > (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0154). Microsoft > released and advisory and a patch for this problem. > (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security /bulletin/MS02-020.asp > ) > > It has also been known that many administrators do not change the > default password for the administrator account. SQL Server by default > ships with no password set for this account > ( http://www.bhs.silesianet.pl/html/sql.htm ). > > > _______________________________________________ > Twin Cities Linux Users Group Mailing List - Minneapolis/St. Paul, Minnesota > http://www.mn-linux.org > tclug-list at mn-linux.org > https://mailman.mn-linux.org/mailman/listinfo/tclug-list > >