Here's a little more information from Gibson research Corporation - GRC.com - a GREAT resource!
Another THREE New DCOM/RPC Windows Vulnerabilities Revealed
September 10th, 2003 – Microsoft releases news of three additional recently discovered vulnerabilities in the Windows DCOM / RPC system. (Go to GRC.com if you're curious for more Microsoft information.) Two of the three vulnerabilities allow anonymous hackers to run their own program code in your computer to remotely take it over. Even though almost any other security measures will prevent that from happening (a personal router, firewall, etc.), the MSBlast worm showed us what happens, even so.
As it was designed to, our DCOMbobulator preempted these latest vulnerabilities even before Windows was again patched for them.
The DCOMbobulator simply turns off the unneeded and unnecessary DCOM system. No one who previously used our DCOMbobulator to disable DCOM was ever at risk from these latest vulnerabilities. (Nor will they be if any more are found tomorrow . . . or next year.)
If you haven't used the DCOMbobulator already, do it now. It's free and simple.
September 11th, 2003 – Version 2.0 of our DCOMbobulator is now available for download. If DCOM is enabled on the system (for patch verification) it recognizes the presence of Microsoft's latest round of DCOM patches and properly reports that a fully patched system is no longer vulnerable to the most recently discovered DCOM vulnerabilities.
Introducing the DCOMbobulator
117,369 downloads (3,906 per day) The DCOMbobulator allows any Windows user to easily verify the effectiveness of Microsoft's recent critical DCOM patch. Confirmed reports have demonstrated that the patch is not always effective in eliminating DCOM's remote exploit vulnerability.
But more importantly, since DCOM is a virtually unused and unneeded facility, the DCOMbobulator allows any Windows user to easily disable DCOM for significantly greater security.
FOLLOW THIS LINK to learn about this latest freeware! ( the link is disabled in this message - go to grc.com to catch it live)
Shoot The Messenger 205,732 downloads.
Even before the latest DCOM/RPC vulnerability (see above), many Windows users were being annoyed by "pop-up spam" notices appearing on their desktops. This intrusion is also facilitated by an exploitation of port 135. Our free "Shoot The Messenger" utility furthers the security of Windows by quickly and easily shutting down the "Windows Messenger" server that should never have been running by default in the first place.