SECURITY: Microsoft XP Flaw Discovered - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

SECURITY: Microsoft XP Flaw Discovered

This vulnerability affects Microsoft's Universal Plug and Play architecture.

Security vendors are warning of new Microsoft vulnerabilities that affect PCs running the company's Universal Plug and Play architecture. That architecture ships in Windows XP, but also can be installed in Windows 98, 98 SE, and ME.

According to a security bulletin published Thursday by Microsoft, remote attackers have the ability, through a buffer overflow, to gain control of a victim's system. The attacker could run apps or use the PC as part of a denial-of-service attack. Microsoft has published its security bulletin MS01-059 as well as patches at www.microsoft.com/security.

Jim Magdych, director of Covert Labs for Network Associates Inc., says users running the plug-and-play architecture and who aren't blocking ports 1900 and 5000 are vulnerable. Magdych says it's just a matter of time before someone publishes automated tools to exploit this vulnerability or unleashes an automated exploit such as Code Red.

EEye Digital Security, the same company that discovered the flaw in Microsoft's Internet Information Services that was capitalized on by the author of Code Red, also found this security hole. EEye had taken considerable criticism at the time for releasing too much information about that vulnerability. Some argued that eEye made it easier for hackers to exploit IIS's vulnerabilities.

In early November, Microsoft revealed its vulnerability-disclosure initiative, a plan to create an organization that promotes "the need to develop and institutionalize a code of conduct for responsible handling of security vulnerabilities."

Bob Lonadier, president and security analyst at RCL & Associates, says that if a "maverick" firm like eEye "can see the wisdom in getting along with Microsoft, then there is no need for a different type of disclosure model. What's needed is better code-development standards to catch these vulnerabilities before they are released."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
10 Top Cloud Computing Startups
Cynthia Harvey, Freelance Journalist, InformationWeek,  8/3/2020
Commentary
Adding Fuel to the MSP vs. In-house IT Debate
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  8/6/2020
Commentary
How Enterprises Can Adopt Video Game Cloud Strategy
Joao-Pierre S. Ruth, Senior Writer,  7/28/2020
Register for InformationWeek Newsletters
Video
Current Issue
Enterprise Automation: Do More with Less
In this IT Trend Report, we highlight the benefits of automation and the various tools as enterprises navigate turbulent times, try to do more with less, keep their operations running, and stay on track with digital modernizations.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll