In a strange way, a feather in AMD's cap, as so far the tests show that 
hardwareDEP (in the Athlon64) pretty much kills the loop.

-----Original message-----
From: Robert Turnbull [EMAIL PROTECTED]
Date: Tue, 03 Jan 2006 16:12:31 -0600
To: [email protected]
Subject: [H] Windows vulnerability?

>  From ZDNet: <http://blogs.zdnet.com/Ou/index.php?p=143&tag=nl.e589>
> 
> Microsoft's official workaround to unregister a certain DLL file using the 
> command of "regsvr32 /u shimgvw.dll" at the Start-Run prompt seems to also 
> be very effective.  Unfortunately, it kills the ability for Windows 
> Explorer to display thumbnail images but I'm afraid we'll have to live 
> without it until an official patch from Microsoft comes out (hopefully next 
> month's patch cycle).  There are new reports that there are certain cases 
> where this fix doesn't work.  MSPaint and Lotus Notes can still be 
> exploited even with this DLL unregistered.  I think we haven't heard the 
> end of this one yet and there may be many more applications vulnerable to 
> this exploit but the combination of hardware-enforced DEP and unregistering 
> the shimgvw.dll file seems to be very effective for now.
> 
> 
> Best to all.
> 
> Robert Turnbull, Toronto, Canada
> 

Reply via email to