FPCH Admin AWS Posted November 16, 2009 FPCH Admin Posted November 16, 2009 Laurence Gaffié, a security researcher, has discovered a weakness in Windows 7 and published all the relevant details on the full disclosure mailing list archives at Insecure.org. The bug has been recognised by Microsoft but its importance has been minimised by the software company. On his blog, Gaffié went as far as providing with a proof of concept which he used to remotely crash Windows 7 (and Windows Server 2008 R2) on a local area network. Such an attack is also possible through any version of Internet Explorer even older ones (or broadcasting NetBIOS Name Server "trick") even if the system's firewall is activated. The vulnerability, which is found in the Server Message Block (SMB) file sharing protocol, could effectively be used to perform a denial of service (DOS) attack through an infinite loop. Full story: Microsoft Windows 7 Hit By Zero Day Vulnerability - Windows 7 Related Links Microsoft Reacts to Windows 7 0-Day DoS Vulnerability Microsoft working on a fix for a zero-day vulnerability in Windows 7 First Windows 7 zero day exploit is spotted Windows 7 , Server 2008R2 Remote Kernel Crash Quote Off Topic Forum - Unlike the Rest
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.