Author Topic: 17 Years of Windows Blunder Undetected  (Read 729 times)

MikeLigalig.com

  • FOUNDER
  • Webmaster
  • *****
  • Posts: 33316
  • Please use the share icons below
    • View Profile
    • Book Your Tickets on a Budget
17 Years of Windows Blunder Undetected
« on: February 07, 2010, 11:35:16 PM »
A 17-year-old bug in Windows will be patched by Microsoft in its latest security update.

The February update for Windows will close the loophole that dates from the time of the DOS operating system.

First appearing in Windows NT 3.1, the vulnerability has been carried over into almost every version of Windows that has appeared since.

The monthly security update will also tackle a further 25 holes in Windows, five of which are rated as "critical".

Home hijack

The ancient bug was discovered by Google security researcher Tavis Ormandy in January 2010 and involves a utility that allows newer versions of Windows to run very old programs.

Mr Ormandy has found a way to exploit this utility in Windows XP, Windows Server 2003 and 2008 as well as Windows Vista and Windows 7.

The patch for this vulnerability will appear in the February security update. Five of the vulnerabilities being patched at the same time allow attackers to effectively hijack a Windows PC and run their own programs on it. - BBC

Linkback: https://tubagbohol.mikeligalig.com/index.php?topic=25126.0
John 3:16-18 ESV
For God so loved the world, that he gave his only Son (Jesus Christ), that whoever believes in him should not perish but have eternal life. For God did not send his Son into the world to condemn the world, but in order that the world might be saved through him. Whoever believes in him is not condemned, but whoever does not believe is condemned already, because he has not believed in the name of the only Son of God.

👉 GET easy and FAST online loan at www.tala.com Philippines

Book tickets anywhere for planes, trains, boats, bus at www.12go.co

unionbank online loan application low interest, credit card, easy and fast approval

Tags: