CDRInfo Forum CDRInfo Forum

Forums  Register  Login  My Profile  Inbox  Address Book  My Subscription  My Forums 

Photo Gallery  Member List  Search  Calendars  FAQ  Ticket List  Log Out

Windows Security Bypass Is Not Security Threat, Claims Microsoft !   Logged in as: Guest
Viewers: 1373 You can click here to see Today's Posts | Most Active Topics | Posts Since Last Visit
  Printable Version
All Forums >> [News Around The Web] >> Microsoft News >> Windows Security Bypass Is Not Security Threat, Claims Microsoft ! Page: [1]
Login
Message << Older Topic   Newer Topic >>
Windows Security Bypass Is Not Security Threat, Claims ... - 2/2/2005 9:32:35 PM   
WinThusiast


Posts: 1011
Joined: 8/4/2003
From: Ontario - Canada
Status: offline
XP SP2 hole not significant, swears software giant.

A method of bypassing security features in Windows XP Service Pack 2 (SP2) isn't actually a security threat, Microsoft has claimed.


The software giant downplayed the seriousness of a security hole publicised on Monday by Russian security firm Positive Technologies. Positive published a patch for the hole, which could allow an attacker to bypass SP2's Data Execution Protection (DEP), after waiting for more than a month for a Microsoft response, it said.

But Microsoft has now said that while it is investigating Positive's findings, an initial examination showed the bypass was "not a security vulnerability".

"An attacker cannot use this method by itself to attempt to run malicious code on a user's system. There is no attack that utilises this, and customers are not at risk from the situation," Microsoft said in a statement.

DEP is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. According to Positive Technologies chief technology officer Yury Maximov, Positive informed the software maker on 22 December about a problem with DEP and was told to wait for a response from the company.

A month later, the company decided to release its own patch, partly because Maximov understood that hacker groups were already working on ways to exploit the holes in DEP to insert rogue code into a PC's memory.

Microsoft said DEP and heap overflow protection are not really compromised by Positive's findings - they still do their job. "These features effectively address the exploits that they were designed to prevent and make it more difficult for an attacker to run malicious software on the computer as the result of a buffer overrun," the company said. Microsoft added that the features are not designed to protect against all malicious code, just buffer overruns.

The company said it may patch the bypass method in a future update or service pack.

In the meantime, Positive has developed a temporary security measure, which it made available on Friday as a free utility called PTmsHORP. Some industry analysts have advised against using third-party patches however.


Source : TechWorld
Post #: 1
Page:   [1]
All Forums >> [News Around The Web] >> Microsoft News >> Windows Security Bypass Is Not Security Threat, Claims Microsoft ! Page: [1]
Jump to:





New Messages No New Messages
Hot Topic w/ New Messages Hot Topic w/o New Messages
Locked w/ New Messages Locked w/o New Messages
 Post New Thread
 Reply to Message
 Post New Poll
 Submit Vote
 Delete My Own Post
 Delete My Own Thread
 Rate Posts




Forum Software © ASPPlayground.NET Advanced Edition 2.4.5 ANSI

0.174