SECURITY: Microsoft XP Flaw Discovered - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

SECURITY: Microsoft XP Flaw Discovered

This vulnerability affects Microsoft's Universal Plug and Play architecture.

Security vendors are warning of new Microsoft vulnerabilities that affect PCs running the company's Universal Plug and Play architecture. That architecture ships in Windows XP, but also can be installed in Windows 98, 98 SE, and ME.

According to a security bulletin published Thursday by Microsoft, remote attackers have the ability, through a buffer overflow, to gain control of a victim's system. The attacker could run apps or use the PC as part of a denial-of-service attack. Microsoft has published its security bulletin MS01-059 as well as patches at www.microsoft.com/security.

Jim Magdych, director of Covert Labs for Network Associates Inc., says users running the plug-and-play architecture and who aren't blocking ports 1900 and 5000 are vulnerable. Magdych says it's just a matter of time before someone publishes automated tools to exploit this vulnerability or unleashes an automated exploit such as Code Red.

EEye Digital Security, the same company that discovered the flaw in Microsoft's Internet Information Services that was capitalized on by the author of Code Red, also found this security hole. EEye had taken considerable criticism at the time for releasing too much information about that vulnerability. Some argued that eEye made it easier for hackers to exploit IIS's vulnerabilities.

In early November, Microsoft revealed its vulnerability-disclosure initiative, a plan to create an organization that promotes "the need to develop and institutionalize a code of conduct for responsible handling of security vulnerabilities."

Bob Lonadier, president and security analyst at RCL & Associates, says that if a "maverick" firm like eEye "can see the wisdom in getting along with Microsoft, then there is no need for a different type of disclosure model. What's needed is better code-development standards to catch these vulnerabilities before they are released."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll