havnblast Posted November 14, 2003 Share Posted November 14, 2003 With the posting Wednesday of proof-of-concept exploit code for one of the newly discovered vulnerabilities in Windows, the familiar chain of events that often leads to the release of a worm has begun.The cycle began Tuesday when Microsoft Corp. released its monthly passel of patches, including one for a flaw in the Workstation service in Windows 2000 and XP. A successful exploitation would give the attacker complete control of the compromised PC, Microsoft said.Less than 24 hours after Microsoft issued the fix, a member of the BugTraq security mailing list posted exploit code for the vulnerability. The author said the code had been tested only on a Windows 2000 machine with Service Pack 4 installed and the FAT32 file system running. However, experts said it would take little effort to adapt the code for other Windows machines.And, more importantly, the Workstation vulnerability appears to be a prime candidate for a worm. Article Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted November 14, 2003 Share Posted November 14, 2003 Thanks havnblast for posting the info!FYI: Here's the Microsoft Windows Bulletin and fix info:http://www.microsoft.com/technet/treeview/...in/MS03-049.asp Quote Link to comment Share on other sites More sharing options...
havnblast Posted November 14, 2003 Author Share Posted November 14, 2003 I believe what the article is saying is that this is new exploit after MS released those patches Less than 24 hours after Microsoft issued the fix, a member of the BugTraq security mailing list posted exploit code for the vulnerabilityso I don't think that is the fix LilBambi Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.