It gets released in the UK at 22.00 tonight.
Oh my god I am so excited! I think I will stay up all night for this.
Or maybe not on second thought...
Everyone might also want to install the free "Belarc Advisor" which is better than using WindowsUpdate to check for missing security patches in my experience - it will find official patches for other Microsoft products you have installed.
Considering it's an out-of-cycle patch, I'd not bet on the bad guys not already actively exploiting it. Hence no need to reverse engineer, they most likely already know and actively abuse it.
It's that or they are doing something PR minded to be able to say "already fixed".
Do any of these various remote-code-execution exploits work if hardware data-execution-prevention is enabled?
Wow, there have been 5 responses and not a single self righteous mac or linux user saying you wouldn't have a problem if you used said systems. Amazing... :)
haha, I think that defense has run its course.
Already available for download, select your environment here:
In the US
we may now directly get it from the regular on PC "updates"
I got my XP updates about 9 hours ago, but the Vista updates just came through a few minutes ago for me.
The current advice is install them ASAP.
MS hasn't released a patch out of its scheduled Patch Tuersday cycle in a year and a half. This looks quite serious.
|Microsoft Security Bulletin MS08-067 – Critical [microsoft.com] |
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.
To answer my own question, and having done a little research, my best guess is that hardware data execution prevention would NOT protect against a vulnerability of this sort.
Sometimes you have to wonder what MS programmers do all day. This problem has existed since at least Windows 2000, and I rather suspect it's a design fault not a coding error!
|New worm feeds on latest Microsoft bug [nytimes.com] |
One day after Microsoft issued a rare emergency Windows security patch, the bad guys have a few new ways to take advantage of the bug.
By Friday, security researchers had identified a new worm, called Gimmiv, which exploited the vulnerability, and a hacker had posted an early sample of code that could be used to exploit the flaw on the Web.
Microsoft issued the patch more than two weeks ahead of its next security updates because the bug could be used to create an Internet worm attack and Microsoft had already seen a small number of attacks that exploited the flaw.
This vulnerability lies in the Windows Server service used to connect with other devices on networks. Although the firewall software that ships with Windows will block the worm from spreading, security experts are worried that the flaw could be used to spread infections between machines on a local area network, which are not typically protected by firewalls.