havnblast Posted November 14, 2003 Posted November 14, 2003 With the posting Wednesday of proof-of-concept exploit code for one of the newly discovered vulnerabilities in Windows, the familiar chain of events that often leads to the release of a worm has begun.The cycle began Tuesday when Microsoft Corp. released its monthly passel of patches, including one for a flaw in the Workstation service in Windows 2000 and XP. A successful exploitation would give the attacker complete control of the compromised PC, Microsoft said.Less than 24 hours after Microsoft issued the fix, a member of the BugTraq security mailing list posted exploit code for the vulnerability. The author said the code had been tested only on a Windows 2000 machine with Service Pack 4 installed and the FAT32 file system running. However, experts said it would take little effort to adapt the code for other Windows machines.And, more importantly, the Workstation vulnerability appears to be a prime candidate for a worm. Article Quote
Guest LilBambi Posted November 14, 2003 Posted November 14, 2003 Thanks havnblast for posting the info!FYI: Here's the Microsoft Windows Bulletin and fix info:http://www.microsoft.com/technet/treeview/...in/MS03-049.asp Quote
havnblast Posted November 14, 2003 Author Posted November 14, 2003 I believe what the article is saying is that this is new exploit after MS released those patches Less than 24 hours after Microsoft issued the fix, a member of the BugTraq security mailing list posted exploit code for the vulnerabilityso I don't think that is the fix LilBambi Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.