Just to give a heads up to those network admins that are forced to look after 
mixed network, the coming weeks are going to be hell!

I just cannot fathom why such an easy exploit is still possible and on the 
latest Windoze OS!.... Its so Depressing!



http://www.eweek.com/c/a/Security/Microsoft-Windows-Security-Advisory-Flawed-Security-Pros-Say-258914/

...........Some security pros are taking issue with Microsoft's advisory on a 
zero-day vulnerability one researcher referred to as "simple to exploit."
The vulnerability lies in the Windows Shell component. While Microsoft asserted 
in its advisory July 16 that the result of the vulnerability is that "malicious 
code may be executed when the user clicks the displayed icon of a specially 
crafted shortcut," security researchers are stressing that it is not necessary 
for users to click on an icon.

"All you do is open a device/network share/WebDav point that has the shortcut, 
and boom! It runs whatever you tell it to," said Sophos Senior Security Advisor 
Chester Wisniewski. "It is downright simple to exploit. Any criminal with the 
most basic of skills can take advantage of this flaw. We have not seen much 
activity in the wild yet, but now that a proof of concept is posted it is 
likely to become a major issue as the week rolls on."........................

...............Sean Sullivan, security advisor for North American Labs at 
F-Secure, wrote on the company's blog that F-Secure's analysis indicated 
clicking on an icon was not required, and simply browsing the removable drive 
was enough to trigger malware. In addition, disabling the AutoPlay feature on 
Windows 7 "isn't much of a mitigating factor for the vulnerability" despite 
what's stated in the advisory, he said.
"It's only: click Start, click Computer and click [Removable] Disk," Sullivan 
wrote. "Three clicks and you're at risk.......................







        -- Acta Virum Probant --

- ----
Kiggundu Mukasa
SERVAL LTD.
Plot 80 Kanjokya Street
P.O. Box 24284 Kampala, Uganda
Tel:    +256 772 972255
        +256 414 571779
Fax:    +256 312 262122

http://serval.ug




_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug

LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

All Archives can be found at http://www.mail-archive.com/[email protected]/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to