Exploit code puts Windows XP and 2000 at risk (again)
Exploit code has been published that could take advantage of flaws in Windows XP SP1 and Windows 2000 SP4, according to a warning issued Thursday by Microsoft.
Although the exploit code could be used to launch a denial-of-service attack in machines running XP SP1 and Windows 2000 with all service pack versions, the threat is only moderately severe, said Steve Manzuik, a product manager at security research company eEye Digital Security.
“On a scale of 10, it would be about a 4 or 5 on severity,” said Manzuik. “All it will do is crash some machines and not crash others.”
The exploit code could allow an attacker to launch a remote denial-of-service attack on Windows 2000 machines using all service pack versions, but would require a user authentication on Windows XP SP1 computers, Manzuik said.
The exploit poses only a moderate risk because it requires a user to log on for Windows XP, and in the case of Windows 2000, the attacker would have to get remote access to the Remote Procedure Call (RPC) port. That port is often behind a firewall, making it difficult to penetrate remotely, Manzuik noted.
Microsoft has yet to develop a security patch for this exploit, but it recommended that users enable their firewalls and download security updates, according to its security advisory.
The exploit code was published by Winny Thomas of Nevis Labs in India, who reverse-engineered a patch Microsoft issued in October, according to a posting on FrSIRT’s Web site. The patch, MS05-047, dealt with a plug-and-play feature in the Windows software.
more from [url=http://tb.news.com/tb.cgi/2100-1002_3-5958846]News dot com[/url]
Post a reply
You must be logged in to post a comment.