('binary' encoding is not supported, stored as-is) Mailer: SecurityFocus Whilst indepth analysis could not be done (unit was sent back to vendor to be rebuilt), it appears that Windows XP has a similar exploit as Windows NT4. See http://hypoclear.cjb.net/hypo_nt_dos.txt Windows XP Home was running happily for a few weeks and as of yesterday would not allow the machine to boot up complaining of a 'ISASS.EXE" error and then rebooting itself. Trying the repair options after booting off CDROM, resulted in being asked for the administrator password, of which none has been set, by either the user or the original vendor, but refused to allow blank (default) or any that were tried. The vendor confirmed that they do not set it at all. There was a short timeframe where personal firewall software or virus software was not available, so a suspicion arises that the user was attacked via the internet during that time. Anyone else had any involvement with this problem? Regards Bob Fryer ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Wed Nov 28 2001 - 08:28:11 PST