Monday, November 16, 2009

Microsoft Windows 7 Hit By Zero Day Vulnerability




Laurence Gaffié, a security researcher, has discovered a weakness in Windows 7 and published all the relevant details on the full disclosure mailing list archives at Insecure.org.

The bug has been recognised by Microsoft but its importance has been minimised by the software company. On his blog, Gaffié went as far as providing with a proof of concept which he used to remotely crash Windows 7 (and Windows Server 2008 R2) on a local area network.

Such an attack is also possible through any version of Internet Explorer even older ones (or broadcasting NetBIOS Name Server "trick") even if the system's firewall is activated. The vulnerability, which is found in the Server Message Block (SMB) file sharing protocol, could effectively be used to perform a denial of service (DOS) attack through an infinite loop.

Canada-based Gaffié also maintains that the bug was a "real proof" that Microsoft's Security Development Lifecycle had failed. The temporary solution, according to him would be to, "Close SMB feature and ports, until a real audit is provided." However, the flaw doesn't allow hackers to gain unauthorised remote access to information on any machine.

Read more: http://www.itproportal.com/www/news/article/2009/11/15/microsoft-windows-7-hit-zero-day-vulnerability/#ixzz0X0pf1aTa


submit to reddit Add to Mixx! Stumble Upon Toolbarauthority

0 comments:

Newer Post Older Post

Home
 

Recommended Gadget

  • ads
  • ads
  • ads
  • ads

Techo Bee Copyright © 2009 Gadget Blog is Designed by Ipietoon Sponsored by Online Business Journal