SECURITY: Microsoft XP Flaw Discovered - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

SECURITY: Microsoft XP Flaw Discovered

This vulnerability affects Microsoft's Universal Plug and Play architecture.

Security vendors are warning of new Microsoft vulnerabilities that affect PCs running the company's Universal Plug and Play architecture. That architecture ships in Windows XP, but also can be installed in Windows 98, 98 SE, and ME.

According to a security bulletin published Thursday by Microsoft, remote attackers have the ability, through a buffer overflow, to gain control of a victim's system. The attacker could run apps or use the PC as part of a denial-of-service attack. Microsoft has published its security bulletin MS01-059 as well as patches at www.microsoft.com/security.

Jim Magdych, director of Covert Labs for Network Associates Inc., says users running the plug-and-play architecture and who aren't blocking ports 1900 and 5000 are vulnerable. Magdych says it's just a matter of time before someone publishes automated tools to exploit this vulnerability or unleashes an automated exploit such as Code Red.

EEye Digital Security, the same company that discovered the flaw in Microsoft's Internet Information Services that was capitalized on by the author of Code Red, also found this security hole. EEye had taken considerable criticism at the time for releasing too much information about that vulnerability. Some argued that eEye made it easier for hackers to exploit IIS's vulnerabilities.

In early November, Microsoft revealed its vulnerability-disclosure initiative, a plan to create an organization that promotes "the need to develop and institutionalize a code of conduct for responsible handling of security vulnerabilities."

Bob Lonadier, president and security analyst at RCL & Associates, says that if a "maverick" firm like eEye "can see the wisdom in getting along with Microsoft, then there is no need for a different type of disclosure model. What's needed is better code-development standards to catch these vulnerabilities before they are released."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
News
COVID-19: Using Data to Map Infections, Hospital Beds, and More
Jessica Davis, Senior Editor, Enterprise Apps,  3/25/2020
Commentary
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
Slideshows
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll