Just to give a heads up to those network admins that are forced to look after mixed network, the coming weeks are going to be hell!
I just cannot fathom why such an easy exploit is still possible and on the latest Windoze OS!.... Its so Depressing! http://www.eweek.com/c/a/Security/Microsoft-Windows-Security-Advisory-Flawed-Security-Pros-Say-258914/ ...........Some security pros are taking issue with Microsoft's advisory on a zero-day vulnerability one researcher referred to as "simple to exploit." The vulnerability lies in the Windows Shell component. While Microsoft asserted in its advisory July 16 that the result of the vulnerability is that "malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut," security researchers are stressing that it is not necessary for users to click on an icon. "All you do is open a device/network share/WebDav point that has the shortcut, and boom! It runs whatever you tell it to," said Sophos Senior Security Advisor Chester Wisniewski. "It is downright simple to exploit. Any criminal with the most basic of skills can take advantage of this flaw. We have not seen much activity in the wild yet, but now that a proof of concept is posted it is likely to become a major issue as the week rolls on."........................ ...............Sean Sullivan, security advisor for North American Labs at F-Secure, wrote on the company's blog that F-Secure's analysis indicated clicking on an icon was not required, and simply browsing the removable drive was enough to trigger malware. In addition, disabling the AutoPlay feature on Windows 7 "isn't much of a mitigating factor for the vulnerability" despite what's stated in the advisory, he said. "It's only: click Start, click Computer and click [Removable] Disk," Sullivan wrote. "Three clicks and you're at risk....................... -- Acta Virum Probant -- - ---- Kiggundu Mukasa SERVAL LTD. Plot 80 Kanjokya Street P.O. Box 24284 Kampala, Uganda Tel: +256 772 972255 +256 414 571779 Fax: +256 312 262122 http://serval.ug
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ All Archives can be found at http://www.mail-archive.com/[email protected]/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
