windows sp3 is ok for updates Vista sp1 windows 7 ok for patch soon
http://www.computerworld.com/s/article/9179299/Microsoft_confirms_nasty_Windows_zero_day_bug
But it won't patch the vulnerability for Windows XP SP2 or Windows 2000
Windows fails to correctly parse shortcut files, identified by the ".lnk" extension. The flaw has been exploited most frequently using USB flash drives. By crafting a malicious .lnk file, hackers can hijack a Windows PC with little user interaction: All that's necessary is that the user views the contents of the USB drive with a file manager like Windows Explorer.
exploit works even when AutoRun and AutoPlay -- two functions that have previously been used by attackers to commandeer PCs using infected flash drives -- are disabled. The rootkit also bypasses all security mechanisms in Windows, including the User Account Control (UAC) prompts in Vista and Windows 7, said Wisniewski in a blog entry Friday.
http://www.sophos.com/blogs/chetw/g/2010/07/16/windows-day-attack-works-windows-systems/
nasty_Windows_zero_day_bug_no_patch_for_XP,sp2+2000
(11 posts) (6 voices)-
Posted 14 years ago #
-
Real bad, since I use SP2 on xp :(
Posted 14 years ago # -
Me too Buzz! What are the symptoms if we have that happen?
Posted 14 years ago # -
Every article I read like this pushes me closer to Linux. I hate to learn a whole new OS, but it might be worth it to have a little peace of mind. At least until the number of viruses written for Linux catches up with the number for Windows. That is a shame, too. I like XP.
Posted 14 years ago # -
The same ppl making these attacks today.. are the same ppl working for Microsoft, Cisco, McAffee, Norton, etc... tomorrow.
Preventive measures or counter measures are usually reactionary. First there's the attack.. and then the response. The best you can do is find yourself a good program(s) to protect your system and keep yourself updated. Good software companies will always have a "response" to a new found threat. There will ALWAYS be attacks no matter what OS you find yourself using.
Posted 14 years ago # -
In case someone is interested, Microsoft just released a temporary workaround offering an automated "Microsoft fix it 50486"
(or you can do it yourself editing the registry)
But ... the Task bar and Start menu bar will have white icons without the graphical representation after that....not really much to look at.
(To undo the workaround there is a "Microsoft fix it 50487")Posted 14 years ago # -
I tried the fix yesterday, but as you say, many icons show the default one only.
Undid that though, will worry about it if it ever happens.Posted 14 years ago # -
http://www.techeye.net/security/worm-targets-siemens-industrial-systems
http://community.websense.com/blogs/securitylabs/archive/2010/07/20/microsoft-lnk-vulnerability-brief-technical-analysis-cve-2010-2568.aspx
http://www.zdnet.com/blog/hardware/update-should-you-be-worried-about-the-windows-lnk-vulnerability/8992?tag=nl.e539[UPDATE: So, should you be worried ... ? Well, a little. These attacks have spread over the past few days, but still remain relatively low. However, if you are concerned, of feel that your antivirus software doesn't offer protection, it is advisable that you disable WebDAV client services, just to be safe.]
Posted 14 years ago # -
Sophos has released a free tool to protect against attacks exploiting the critical vulnerability in Windows shortcut files.
(runs in addition to your existing antivirus)"Sophos Shortcut Exploit Protection Tool"
What's it all about? (vid)
Download pageSide note: Should you have applied the Microsoft temporary workaround (...) you'll have to undo it first using "Microsoft Fix it 50487"
Posted 14 years ago # -
Thanks Robert got the "Sophos Shortcut Exploit Protection Tool"
http://www.v3.co.uk/v3/news/2267441/microsoft-release-band-patch
The update, which was deemed too important to wait until the next scheduled monthly patch delivery, will be released at around 6pm GMT. 02 Aug 2010
Posted 14 years ago # -
Thanks Robert for that link. Looks like an easy fix for us few xp sp2 users.
Posted 14 years ago #
Reply
You must log in to post.