11.12.09
Gemini version available ♊︎Vista 7 Exploit is Out (Zero-Day Vulnerability)
Summary: Vista 7 and Server 2008 R2 both suffer from a zero-day hole and there is no solution to it yet
VISTA 7 was never a secure operating system, not even when it was in beta. To give a sample of posts on that matter:
- Cybercrime Rises and Vista 7 is Already Open to Hijackers
- Vista 7: Broken Apart Before Arrival
- Department of Homeland Security ‘Poisoned’ by Microsoft; Vista 7 is Open to Hijackers Again
- Vista 7 Security “Cannot be Fixed. It’s a Design Problem.”
- Why Vista 7 Could be the Least Secure Operating System Ever
- Journalists Suggest Banning Windows, Maybe Suing Microsoft Over DDoS Attacks
- Vista 7 Vulnerable to Latest “Critical” Flaws
- Vista 7 Seemingly Affected by Several More “Critical” Flaws This Month
- Reason #1 to Avoid Vista 7: Insecurity
- Vista 7 Left Hijackable Again (Almost a Monthly Recurrence)
- Vista 7 as Insecure as Predecessors, Shows Sophos
- Microsoft, Novell, SCO, and NASDAQ Delistings
The reality of this matter is that Vista 7, as expected, has a very major new flaw, which is already being exploited
This bug is a real proof that SDL #FAIL
The bug trigger an infinite loop on smb{1,2}, pre-auth, no credential needed…
Can be trigered outside the lan via (IE*)
It sure sounds familiar and Microsoft does no deny it.
Microsoft probing Windows 7 zero-day hole
Microsoft said on Wednesday it is looking into a report of a vulnerability in Windows 7 and Server 2008 Release 2 that could be used by an attacker to remotely crash the computer.
[...]
Gaffié also posted proof-of-concept code for the “Windows 7, Server 2008R2 Remote Kernel Crash.”
“It is an error in the SMB protocol,” tells one person, “and it sends the machine into an infinite loop. Power cycle or reset time it is.”
A reader of ours asks: “Isn’t this a repeat of the teardrops-like exploit from this summer / fall?
“If so, then the reporters seem to think they can get away with [fooling] the public as to how long Microsoft is taking to patch their problems.” █
Update: The Windows kernel has just had critical holes addressed, but the above remains unpatched.
Microsoft on Tuesday issued six security bulletins fixing 15 vulnerabilities, including a critical patch for holes in the Windows kernel and other Windows and Office components that could allow an attacker to take control of a computer.
One of our readers was unable to find out if the RBS disaster has Windows to blame. It’s too secretive.