Microsoft Knowledge Base Article 827363 contains the following summary:

Microsoft has released the KB 824146 scanning tool (KB824146scan.exe) that network administrators can use to identify host computers on their networks that do not have the 823980 (MS03-026) and the 824146 (MS03-039) security patches installed. This tool replaces the KB 823980 scanning tool (KB823980scan.exe).

Note If you use the KB823980scan.exe tool to scan a computer that has the 824146 security patch installed, the tool will incorrectly report that the computer is missing the 823980 security patch (MS03-026). Microsoft encourages customers to run the KB824146scan.exe tool to determine whether the host computers on their networks have the 823980 (MS03-026) and the 824146 (MS03-039) security patches installed.

For additional information about the 824146 security patch (MS03-039), click the following article number to view the article in the Microsoft Knowledge Base:

824146 MS03-039: A Buffer Overrun in RPCSS Could Allow an Attacker to Run Malicious Programs

For additional information about the 823980 security patch (MS03-026), click the following article number to view the article in the Microsoft Knowledge Base:

823980 MS03-026: Buffer Overrun in RPC Interface May Allow Code Execution

For additional information about a new worm virus that tries to exploit the DCOM RPC vulnerability that is fixed by the 823980 security patch (MS03-026), click the following article number to view the article in the Microsoft Knowledge Base:

826955 Virus Alert About the Blaster Worm and Its Variants

For additional information about how network administrators can use Windows Management Instrumentation scripting to install the 823980 security patch (MS03-026) on unpatched computers in their Microsoft Windows NT, Microsoft Windows 2000, or Microsoft Windows Server 2003 domain, click the following article number to view the article in the Microsoft Knowledge Base:

827227 How to Use a Visual Basic Script to Install the 824146 (MS03-039) or 823980 (MS03-026) Security Patch on Remote Host Computers