SECURITY: Microsoft XP Flaw Discovered - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

SECURITY: Microsoft XP Flaw Discovered

This vulnerability affects Microsoft's Universal Plug and Play architecture.

Security vendors are warning of new Microsoft vulnerabilities that affect PCs running the company's Universal Plug and Play architecture. That architecture ships in Windows XP, but also can be installed in Windows 98, 98 SE, and ME.

According to a security bulletin published Thursday by Microsoft, remote attackers have the ability, through a buffer overflow, to gain control of a victim's system. The attacker could run apps or use the PC as part of a denial-of-service attack. Microsoft has published its security bulletin MS01-059 as well as patches at www.microsoft.com/security.

Jim Magdych, director of Covert Labs for Network Associates Inc., says users running the plug-and-play architecture and who aren't blocking ports 1900 and 5000 are vulnerable. Magdych says it's just a matter of time before someone publishes automated tools to exploit this vulnerability or unleashes an automated exploit such as Code Red.

EEye Digital Security, the same company that discovered the flaw in Microsoft's Internet Information Services that was capitalized on by the author of Code Red, also found this security hole. EEye had taken considerable criticism at the time for releasing too much information about that vulnerability. Some argued that eEye made it easier for hackers to exploit IIS's vulnerabilities.

In early November, Microsoft revealed its vulnerability-disclosure initiative, a plan to create an organization that promotes "the need to develop and institutionalize a code of conduct for responsible handling of security vulnerabilities."

Bob Lonadier, president and security analyst at RCL & Associates, says that if a "maverick" firm like eEye "can see the wisdom in getting along with Microsoft, then there is no need for a different type of disclosure model. What's needed is better code-development standards to catch these vulnerabilities before they are released."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
10 Ways to Prepare Your IT Organization for the Next Crisis
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/20/2020
News
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Commentary
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll