Jump to content

Recommended Posts

  • FPCH Admin
Posted

Laurence Gaffié, a security researcher, has discovered a weakness in Windows 7 and published all the relevant details on the full disclosure mailing list archives at Insecure.org.

 

The bug has been recognised by Microsoft but its importance has been minimised by the software company. On his blog, Gaffié went as far as providing with a proof of concept which he used to remotely crash Windows 7 (and Windows Server 2008 R2) on a local area network.

 

Such an attack is also possible through any version of Internet Explorer even older ones (or broadcasting NetBIOS Name Server "trick") even if the system's firewall is activated. The vulnerability, which is found in the Server Message Block (SMB) file sharing protocol, could effectively be used to perform a denial of service (DOS) attack through an infinite loop.

 

Full story: Microsoft Windows 7 Hit By Zero Day Vulnerability - Windows 7

 

Related Links

Microsoft Reacts to Windows 7 0-Day DoS Vulnerability

 

Microsoft working on a fix for a zero-day vulnerability in Windows 7

 

First Windows 7 zero day exploit is spotted

 

Windows 7 , Server 2008R2 Remote Kernel Crash

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...