Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
Exploit Of Windows 2000 Zero-Day To Hit In June
The exploit, which gives an attacker full access to a PC, leverages a flaw in the operating system's kernel that can be triggered through the Server Message Block protocol.
May 25, 2006
1 Min Read
According to the Cupertino, Calif. company's alert, an exploit for the zero-day bug in Windows 2000's SMB (Server Message Block) protocol has been created by Immunity Security, the makers of the CANVAS exploit-creation platform.
By Immunity researcher Dave Aitel's account, the exploit leverages a flaw in the operating system's kernel that can be triggered through SMB, and will give an attacker full access to the PC.
Aitel claimed Immunity will make the exploit public in June.
"Immunity is considered to be a reliable source and we are of the opinion that this information should be treated as fact," read Symantec's warning. "An official security update from Microsoft will likely not be in development until after June when the information is released."
Until then, Symantec recommended that companies restrict SMB services to trusted hosts; if that's not possible, companies should consider upgrading to a newer version of Windows.
Windows 2000 was last patched against an SMB vulnerability in June 2005.
Although Windows 2000 has been in its last lifespan stage since June 2005 -- called "Extended Support" by Microsoft -- the Redmond, Wash. developer still patches bugs in the OS during its monthly security updates.
You May Also Like
Integrations to automate your framework compliance: ISO 27001, SOC 2, and NIST CSF
NIST Cybersecurity Framework 2.0: Changes, impacts, and opportunities for your InfoSec program
*Why DDI? Why it is Important to Integrate DNS, DHCP, and IP Address Management in Your Network
MontanaPBS Shifts to Agile Broadcasting With Help from Raritan KVM Solutions
High Performance Applications with Dominion KX III