homepage Welcome to WebmasterWorld Guest from 54.163.72.86
register, free tools, login, search, pro membership, help, library, announcements, recent posts, open posts,
Become a Pro Member
Home / Forums Index / Microsoft / Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10)
Forum Library, Charter, Moderators: bill

Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10) Forum

    
Urgent Windows patch today
RonPK




msg:3771893
 11:21 am on Oct 23, 2008 (gmt 0)

MS will be releasing a Windows patch later today. It is said to fix a remote code execution vulnerability labeled as important for Vista and critical for older versions of Windows, including XP.

[microsoft.com...]

I guess many crackers will try to reverse engineer the patch the moment it is released and that evil code may soon be used. So we'd probably all better apply the patch asap...

 

BeeDeeDubbleU




msg:3771909
 11:33 am on Oct 23, 2008 (gmt 0)

It gets released in the UK at 22.00 tonight.

jecasc




msg:3771920
 11:40 am on Oct 23, 2008 (gmt 0)

Oh my god I am so excited! I think I will stay up all night for this.

Or maybe not on second thought...

amznVibe




msg:3771946
 12:35 pm on Oct 23, 2008 (gmt 0)

Everyone might also want to install the free "Belarc Advisor" which is better than using WindowsUpdate to check for missing security patches in my experience - it will find official patches for other Microsoft products you have installed.

swa66




msg:3771950
 12:37 pm on Oct 23, 2008 (gmt 0)

Considering it's an out-of-cycle patch, I'd not bet on the bad guys not already actively exploiting it. Hence no need to reverse engineer, they most likely already know and actively abuse it.
It's that or they are doing something PR minded to be able to say "already fixed".

kaled




msg:3771966
 1:21 pm on Oct 23, 2008 (gmt 0)

Do any of these various remote-code-execution exploits work if hardware data-execution-prevention is enabled?

Kaled.

Jack_Hughes




msg:3772038
 2:47 pm on Oct 23, 2008 (gmt 0)

Wow, there have been 5 responses and not a single self righteous mac or linux user saying you wouldn't have a problem if you used said systems. Amazing... :)

carguy84




msg:3772058
 3:01 pm on Oct 23, 2008 (gmt 0)

haha, I think that defense has run its course.

amznVibe




msg:3772225
 6:09 pm on Oct 23, 2008 (gmt 0)

Already available for download, select your environment here:
[microsoft.com...]

henry0




msg:3772291
 8:14 pm on Oct 23, 2008 (gmt 0)

In the US
we may now directly get it from the regular on PC "updates"

bill




msg:3772524
 5:01 am on Oct 24, 2008 (gmt 0)

I got my XP updates about 9 hours ago, but the Vista updates just came through a few minutes ago for me.

The current advice is install them ASAP.

MS hasn't released a patch out of its scheduled Patch Tuersday cycle in a year and a half. This looks quite serious.

Microsoft Security Bulletin MS08-067 Critical [microsoft.com]

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.


kaled




msg:3772643
 10:37 am on Oct 24, 2008 (gmt 0)

To answer my own question, and having done a little research, my best guess is that hardware data execution prevention would NOT protect against a vulnerability of this sort.

Sometimes you have to wonder what MS programmers do all day. This problem has existed since at least Windows 2000, and I rather suspect it's a design fault not a coding error!

Kaled.

bill




msg:3773609
 7:25 am on Oct 26, 2008 (gmt 0)

New worm feeds on latest Microsoft bug [nytimes.com]

One day after Microsoft issued a rare emergency Windows security patch, the bad guys have a few new ways to take advantage of the bug.

By Friday, security researchers had identified a new worm, called Gimmiv, which exploited the vulnerability, and a hacker had posted an early sample of code that could be used to exploit the flaw on the Web.

Microsoft issued the patch more than two weeks ahead of its next security updates because the bug could be used to create an Internet worm attack and Microsoft had already seen a small number of attacks that exploited the flaw.

This vulnerability lies in the Windows Server service used to connect with other devices on networks. Although the firewall software that ships with Windows will block the worm from spreading, security experts are worried that the flaw could be used to spread infections between machines on a local area network, which are not typically protected by firewalls.


Global Options:
 top home search open messages active posts  
 

Home / Forums Index / Microsoft / Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10)
rss feed

All trademarks and copyrights held by respective owners. Member comments are owned by the poster.
Home ¦ Free Tools ¦ Terms of Service ¦ Privacy Policy ¦ Report Problem ¦ About ¦ Library ¦ Newsletter
WebmasterWorld is a Developer Shed Community owned by Jim Boykin.
© Webmaster World 1996-2014 all rights reserved