iTnews
  • Home
  • News
  • Technology
  • Security

Product activation system flaw found in Windows 7

By SC Australia Staff on Nov 18, 2009 10:29AM
Product activation system flaw found in Windows 7

Follows earlier server message block problem.

More flaws have been discovered in Microsoft's Windows 7.

Reports have surfaced that Windows 7's product activation system has been cracked. Richard Kirk, Fortify's European director, said: "The RemoveWAT utility - also known as ChewWGA - exploits at least one of several probable security flaws on Windows 7 to allow a user to bypass the Windows Genuine Advantage registration procedure.

"This type of crack appeared shortly after Windows Vista went on sale in January 2007 and was solved when Microsoft issued an update. Similar utilities for Windows XP also started appearing in the summer of 2005, shortly after the Windows Genuine Advantage system was made mandatory in July of that year."

He further claimed that he expects Microsoft to retroactively re-engineer Windows 7 to prevent any registration loopholes from being exploited, and advised to check and keep checking for flaws.

"More than anything, this highlights the fact that the sheer size of programs these days means that code loopholes will slip through the net unless you are scrutinising them regularly from the moment they are written whether designed in-house or commercially," said Kirk.

An exploit was discovered last week by white hat researcher Laurent Gaffié after Windows 7 was omitted from any fixes on Patch Tuesday, when he detected a flaw in the server message block (SMB) which could be used by attackers to kill Windows 7 and WS2K8 R2 systems. A
patch was pushed out at the end of last week for the vulnerability.

Chris Merritt, director of solution marketing at Lumension, said: “Disturbingly, there seems to be no blue screen of death to indicate you've been hit – it just crashes the kernel and you see nothing. In it's analysis of the issue, Microsoft suggests in its Security Advisory 97544 that you block TCP ports 139 and 445 at the firewall.

“While this is the first zero-day vulnerability found in Redmond's latest and greatest, it will not be the last. That's why it's as important as ever to stay current with all patches (and not only those coming from MS) and think through your defence-in-depth strategy.”

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
7activationblockflawmessagemicrosoftproductsecurityserversystemwindows

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Winning strategies for complaints and disputes management in financial services
Promoted Content Winning strategies for complaints and disputes management in financial services
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By SC Australia Staff
Nov 18 2009
10:29AM
0 Comments

Related Articles

  • Microsoft details massive phishing operation
  • Microsoft's monthly patch includes four serious bugs
  • Poor patching creates easy zero-day vulnerability reuse
  • Don't remove PowerShell: US, UK and NZ security agencies
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

Google Cloud IoT Core goes on the end-of-life list

Google Cloud IoT Core goes on the end-of-life list

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Bunnings assembles a tech team of 700 in four years

Bunnings assembles a tech team of 700 in four years

Digital Nation

Save the Date — Digital Nation Live launches on October 25
Save the Date — Digital Nation Live launches on October 25
Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Edge and IoT critical to Web3 infrastructure
Edge and IoT critical to Web3 infrastructure
CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.