Microsoft is investigating a researcher's claim that the software giant's newest operating system contains a vulnerability that could be exploited to crash systems.Researcher Laurent Gaffie published proof-of-concept code that allows an attacker to exploit a vulnerability in Windows 7 and Server 2008 Release 2.The flaw, detailed by Gaffie in a blog post last week, lies in the Windows Server Message Block (SMB) and requires no user interaction to exploit. Attackers can remotely crash systems if a victim machine receives malformed packets, Jonathan Leopando, a member of the Trend Micro technical communications team, said in a blog post."Whatever your firewall is set to, you can get remotely smashed via IE (Internet Explorer) or even via some NBNS (NetBios Name Service) tricks," Gaffie said.Christopher Budd, security response communications lead at Microsoft, said in a statement that the software giant is aware of the purported vulnerability, which is said to cause a denial-of-service attack."We're currently unaware of any attacks trying to use the claimed vulnerability or of customer impact," Budd said. "Once we're done investigating, we will take appropriate action to help protect customers."Users are encouraged to block ports used by the SMB protocol until Microsoft offers workarounds or permanent fix, Leopando said.In October, Microsoft patched another serious vulnerability in the SMB protocol that Gaffie discovered.See original article on scmagazineus.com
Copyright © SC Magazine, US edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.