In a strange way, a feather in AMD's cap, as so far the tests show that hardwareDEP (in the Athlon64) pretty much kills the loop.
-----Original message----- From: Robert Turnbull [EMAIL PROTECTED] Date: Tue, 03 Jan 2006 16:12:31 -0600 To: [email protected] Subject: [H] Windows vulnerability? > From ZDNet: <http://blogs.zdnet.com/Ou/index.php?p=143&tag=nl.e589> > > Microsoft's official workaround to unregister a certain DLL file using the > command of "regsvr32 /u shimgvw.dll" at the Start-Run prompt seems to also > be very effective. Unfortunately, it kills the ability for Windows > Explorer to display thumbnail images but I'm afraid we'll have to live > without it until an official patch from Microsoft comes out (hopefully next > month's patch cycle). There are new reports that there are certain cases > where this fix doesn't work. MSPaint and Lotus Notes can still be > exploited even with this DLL unregistered. I think we haven't heard the > end of this one yet and there may be many more applications vulnerable to > this exploit but the combination of hardware-enforced DEP and unregistering > the shimgvw.dll file seems to be very effective for now. > > > Best to all. > > Robert Turnbull, Toronto, Canada >
