Thursday, December 18, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
North Korea Linked To Recent Sony Hacking
Sony Global Education Established
CEA and Japan Audio Society to Jointly Promote Hi-Res Audio
Intel, IBM Follow Different Strategies On 14nm FinFET
Toshiba Announces 6TB Enterprise Capacity HDD Models
WebOS 2.0 Smart TV Platfom To Debut At CES
ICANN Targeted in Phishing Attack
BlackBerry Classic Makes Official Debut
Active Discussions
Windows xp
Will there be any trade in scheme for the coming PSP Go?
Hello, Glad to be Aboard!!!
Best optical drive for ripping CD's? My LG 4163B is mediocre.
Hi All!
cdrw trouble
CDR for car Sat Nav
DVD/DL for Optiarc 7191S at 8X
 Home > News > General Computing > Importa...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 15, 2004
Important Windows flaw could turn critical


Security experts are bracing themselves for a spate of new worms and viruses designed to exploit of the seven new vulnerabilities announced by Microsoft on Tuesday as part of its monthly patch cycle.

Of the new vulnerabilities, Windows Shell (MS04-024)--has been picked out by security experts as a potential target for future worms and viruses.

Ben Nagy, senior security engineer at security researcher firm eEye, said he expects the Windows Shell bug to be the most serious threat--despite Microsoft rating the problem as 'important' rather than 'critical'.

According to Microsoft, if a user is vulnerable to MS04-024 and has administrator privileges, an attacker could "take complete control of the affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges."

However, the flaw is not rated as critical because it would require "significant user interaction" to work. This means that a user would need to open an e-mail attachment, or download a file from a malicious Web site.

Richard Starnes, president of security industry group ISSA UK, said that malware writers usually reverse-engineer Microsoft's patches in order to produce exploits. Based on his on experience of previous threats, he expects the first batch of new exploit codes to be available as early as next week. These would probably be used to create a worm delivered as an email attachment.

"Given the trend, it will probably take between five and seven days for exploits to start appearing--depending on their complexity. Because it has to be locally executed, it is likely to be another LoveBug scenario," Starnes said.

EEye's Nagy agrees that to exploit the vulnerability, a virus will most likely be distributed as an e-mail attachment, but the vulnerability could also be 'blended' with another attack.

"I don't think either vulnerability could create a Sasser or MSBlast type-worm, but we are seeing many blended threats, so it could be used in combination with other exploits," said Nagy.

From ZDNet



Previous
Next
Kingston Launches New Ultra Low-Latency DDR PC3200 Memory Kits For PC Enthusiasts        All News        Windows Security Updates for July 2004
TV laptop from Toshiba     General Computing News      Windows Security Updates for July 2004

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
Tech Giants Support Microsoft In Data Fight With U.S.
Cortana Arrives in France, Italy, Germany, and Spain
Microsoft Creates Tools That Unlock the Power of Living Cells
Microsoft Acquires Mobile Email App Provider Acompli
Microsoft Accidentally Anounced Acquisition Of Acompli
Microsoft Offers Massive Music Deals For The Holidays
Microsoft Slashes Prices Of Xbox One, Surface 3 For Black Friday
Samsung Loses Bid Against Microsoft
Microsoft To Offer Digital Services To Real Madrid Soccer Fans
Microsoft Surface Pro 3 Update Fixes Bugs
Microsoft's 3D Soundscape Technology Research Helps Visually Impaired
Microsoft Buys Cloud-security Company Aorato

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .