homepage Welcome to WebmasterWorld Guest from
register, free tools, login, search, pro membership, help, library, announcements, recent posts, open posts,
Become a Pro Member
Home / Forums Index / Microsoft / Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10)
Forum Library, Charter, Moderators: bill

Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10) Forum

Urgent Windows patch today

 11:21 am on Oct 23, 2008 (gmt 0)

MS will be releasing a Windows patch later today. It is said to fix a remote code execution vulnerability labeled as important for Vista and critical for older versions of Windows, including XP.


I guess many crackers will try to reverse engineer the patch the moment it is released and that evil code may soon be used. So we'd probably all better apply the patch asap...



 11:33 am on Oct 23, 2008 (gmt 0)

It gets released in the UK at 22.00 tonight.


 11:40 am on Oct 23, 2008 (gmt 0)

Oh my god I am so excited! I think I will stay up all night for this.

Or maybe not on second thought...


 12:35 pm on Oct 23, 2008 (gmt 0)

Everyone might also want to install the free "Belarc Advisor" which is better than using WindowsUpdate to check for missing security patches in my experience - it will find official patches for other Microsoft products you have installed.


 12:37 pm on Oct 23, 2008 (gmt 0)

Considering it's an out-of-cycle patch, I'd not bet on the bad guys not already actively exploiting it. Hence no need to reverse engineer, they most likely already know and actively abuse it.
It's that or they are doing something PR minded to be able to say "already fixed".


 1:21 pm on Oct 23, 2008 (gmt 0)

Do any of these various remote-code-execution exploits work if hardware data-execution-prevention is enabled?



 2:47 pm on Oct 23, 2008 (gmt 0)

Wow, there have been 5 responses and not a single self righteous mac or linux user saying you wouldn't have a problem if you used said systems. Amazing... :)


 3:01 pm on Oct 23, 2008 (gmt 0)

haha, I think that defense has run its course.


 6:09 pm on Oct 23, 2008 (gmt 0)

Already available for download, select your environment here:


 8:14 pm on Oct 23, 2008 (gmt 0)

In the US
we may now directly get it from the regular on PC "updates"


 5:01 am on Oct 24, 2008 (gmt 0)

I got my XP updates about 9 hours ago, but the Vista updates just came through a few minutes ago for me.

The current advice is install them ASAP.

MS hasn't released a patch out of its scheduled Patch Tuersday cycle in a year and a half. This looks quite serious.

Microsoft Security Bulletin MS08-067 Critical [microsoft.com]

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.


 10:37 am on Oct 24, 2008 (gmt 0)

To answer my own question, and having done a little research, my best guess is that hardware data execution prevention would NOT protect against a vulnerability of this sort.

Sometimes you have to wonder what MS programmers do all day. This problem has existed since at least Windows 2000, and I rather suspect it's a design fault not a coding error!



 7:25 am on Oct 26, 2008 (gmt 0)

New worm feeds on latest Microsoft bug [nytimes.com]

One day after Microsoft issued a rare emergency Windows security patch, the bad guys have a few new ways to take advantage of the bug.

By Friday, security researchers had identified a new worm, called Gimmiv, which exploited the vulnerability, and a hacker had posted an early sample of code that could be used to exploit the flaw on the Web.

Microsoft issued the patch more than two weeks ahead of its next security updates because the bug could be used to create an Internet worm attack and Microsoft had already seen a small number of attacks that exploited the flaw.

This vulnerability lies in the Windows Server service used to connect with other devices on networks. Although the firewall software that ships with Windows will block the worm from spreading, security experts are worried that the flaw could be used to spread infections between machines on a local area network, which are not typically protected by firewalls.

Global Options:
 top home search open messages active posts  

Home / Forums Index / Microsoft / Microsoft Windows OS (XP/NT/Vista/Windows 7/8/9/10)
rss feed

All trademarks and copyrights held by respective owners. Member comments are owned by the poster.
Home ¦ Free Tools ¦ Terms of Service ¦ Privacy Policy ¦ Report Problem ¦ About ¦ Library ¦ Newsletter
WebmasterWorld is a Developer Shed Community owned by Jim Boykin.
© Webmaster World 1996-2014 all rights reserved