The exploit, which gives an attacker full access to a PC, leverages a flaw in the operating system's kernel that can be triggered through the Server Message Block protocol.
Symantec warned its enterprise customers Thursday that an unpatched vulnerability in Windows 2000's file sharing protocol has surfaced, with details of an exploit expected to show next month.
According to the Cupertino, Calif. company's alert, an exploit for the zero-day bug in Windows 2000's SMB (Server Message Block) protocol has been created by Immunity Security, the makers of the CANVAS exploit-creation platform.
By Immunity researcher Dave Aitel's account, the exploit leverages a flaw in the operating system's kernel that can be triggered through SMB, and will give an attacker full access to the PC.
Aitel claimed Immunity will make the exploit public in June.
"Immunity is considered to be a reliable source and we are of the opinion that this information should be treated as fact," read Symantec's warning. "An official security update from Microsoft will likely not be in development until after June when the information is released."
Until then, Symantec recommended that companies restrict SMB services to trusted hosts; if that's not possible, companies should consider upgrading to a newer version of Windows.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.