Yesterday Microsoft published an extraordinary security bulletin called MS08-067. This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution and it is exploited by sending a specially crafted RPC (like Sasser, Blaster) request to a vulnerable system. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems (even Windows 7 Pre-Beta), an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.
This vulnerability is rated as critical for Windows 2000, Windows XP, Windows Server 2003 and as important for Windows Vista and Windows Server 2008.
We have already seen the first Trojan that has been sent out using this vulnerability, we detect is as Trj/Gimmiv.A. The Trojan itself is not using the vulnerability to spread, but someone is infecting systems with it using the vulnerability.
We strongly recommend you to update you system as soon as possible.