Microsoft MS03-034 security check

Under certain conditions, the response to a NetBT Name Service query may, in addition to the typical reply, contain random data from the target system's memory. This data could, for example, be a segment of HTML if the user on the target system was using an Internet browser, or it could contain other types of data that exist in memory at the time that the target system responds to the NetBT Name Service query. An attacker could seek to exploit this vulnerability by sending a NetBT Name Service query to the target system and then examine the response to see if it included any random data from that system's memory.
Microsoft has released a patch to fix this issue, download it from the following website: Windows Server 2003 Windows Server 2003 64 bit Edition Windows XP Windows XP 64 bit Edition Windows 2000 Windows NT Server 4.0 Windows NT Server 4.0, Terminal Server Edition