|
|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|
|
|
|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|
|
|
|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|
|
|
|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|
|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|
|
|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
|
|
|
|
|
Time:
12:12 EST/17:12 GMT | News Source:
Microsoft Press Release |
Posted By: Jonathan Tigner |
On Tuesday, December 27, 2005, Microsoft became aware of public reports of attacks on some customers that exploit a vulnerability in the Windows Meta File (WMF) code area in the Windows platform. Upon learning of the attacks, Microsoft mobilized under its Software Security Incident Response Process (SSIRP) to analyze the attack, assess its scope and determine the appropriate guidance for customers, as well as to engage with anti-virus partners and law enforcement.
Microsoft has completed development of a security update to fix the vulnerability. The security update is now being finalized through testing to ensure quality and application compatibility. Microsoft’s goal is to release the update on Tuesday, January 10, 2006, as part of its monthly release of security bulletins on the second Tuesday of the month. The update will be released worldwide simultaneously in 23 languages for all affected versions of Windows once it passes a series of rigorous testing procedures. It will be available through Microsoft Update and Windows Update, as well as Microsoft’s Download Center and through Windows Server Update Services for enterprise customers. Customers who use Windows’ Automatic Updates feature will be delivered the fix automatically.
Based on strong customer feedback, all Microsoft’s security updates must pass a series of testing processes, including testing by third-parties, to assure customers that they can be deployed effectively in all languages and for all versions of the platform with minimum down time.
Microsoft has been carefully monitoring the attempted exploitation of the WMF vulnerability since it became public last week, through its own forensic capabilities and through partnerships within the industry and law enforcement. Although the issue is serious and the attacks are being attempted, Microsoft’s intelligence sources indicate that the scope of the attacks is limited. In addition, attacks exploiting the WMF vulnerability are being effectively mitigated by anti-virus companies with up-to-date signatures.
|
|
#1 By
32132 (142.32.208.231)
at
1/3/2006 12:25:47 PM
|
Its too bad *nix bugs don't get the same coverage:
http://arstechnica.com/news.ars/post/20060102-5875.html
"The end of an old year and beginning of a new one is always a favorite time to compile lists. One such compendium comes from the US-CERT, the US Computer Emergency Readiness Team, which has come up with a list of 5,198 software bugs that were discovered during 2005, a 38 percent increase from 2004."
"Looking at the numbers, 812 of the flaws were found on Windows and 2,328 were specific to *NIX (including Linux, Unix, and Mac OS X). The other 2,058 bugs affected multiple operating systems, such as the Macromedia Flash Array Index Remote Arbitrary Code Execution vulnerability. That one affected users of Linux, Windows, Solaris, and Mac OS X."
"For all the hate Microsoft gets for the seemingly endless stream of vulnerability announcements and patch cycle, Windows operating systems accounted for fewer than one-sixth of the bugs."
|
#2 By
15406 (216.191.227.68)
at
1/3/2006 1:47:44 PM
|
#1: They don't get the same coverage because 1) the Windows monopoly means far more people are affected, and 2) the Windows bugs are usually much more severe. Nice spin, though. That list is bogus as it includes duplicate entries for each flavour of Unix. One bug in a library shipped by 10 flavours of Unix does not equal 10 bugs.
|
#3 By
7754 (216.160.8.41)
at
1/3/2006 1:58:00 PM
|
This is no time for "other OSes have security holes, too" arguments. This is a very serious bug, and I'm a bit disappointed that Microsoft is waiting until their regular round of updates to release the patch (assuming they feel they'll be ready with it by then!). Due to the lack of acceptable workarounds (unless you're one of the lucky ones running hardware DEP), the fact that exploits are in the wild and the timing of the release, the inadequate ability of anti-virus solutions to protect against it, and the fact that a patch has been released by a third-party, this has great embarrassment to Microsoft written all over it. I would be much happier if they at least released the patch they already have as an uninstallable beta, use-at-your-own-risk-until-the-final-release fix is available.
|
#4 By
16451 (67.131.75.2)
at
1/3/2006 3:11:29 PM
|
Sigh....school must be back in session
|
#5 By
32132 (142.32.208.231)
at
1/3/2006 3:16:06 PM
|
#2 "That list is bogus as it includes duplicate entries for each flavour of Unix. "
According to US-CERT, if it affects multiple vendors, it is listed as a "Multiple Vendors ..." entry.
Most of the Windows entries are application bugs. Not bugs in a Microsoft OS or Microsoft software.
#2 "the Windows monopoly means far more people are affected"
I was sure that the OSS fanatics claimed that code review would mean less security holes in *NIX. It appears that the situation is just the opposite.
However, I do agree that so few people are using Linux that few people are affected by the their swiss cheese approach to security.
#3 "This is no time for "other OSes have security holes, too" arguments. "
Sure it is. The sensationalist anti-Microsoft press and their useful idiots should always be reminded that other operating systems have more vulnerabilities than Windows.
Its nice to know someone is keeping count, and Windows wins because it is more secure.
"the inadequate ability of anti-virus solutions to protect against it,"
Well .. I use McAfee, and last time I read about it, with heuristic scanning turned on, McAfee picked up every variant.
"I would be much happier if they at least released the patch they already have as an uninstallable beta, use-at-your-own-risk-until-the-final-release fix is available."
Sure you would ... until the second it caused one problem for you.
|
#6 By
32132 (142.32.208.231)
at
1/3/2006 3:19:53 PM
|
#3 " the inadequate ability of anti-virus solutions to protect against it"
http://www.eweek.com/article2/0,1895,1907102,00.asp
AV-Test, which tests anti-malware products, has been tracking the situation closely and has, so far, analyzed 73 variants of malicious WMF files. Products from the following companies have identified all 73:
Alwil Software (Avast)
Softwin (BitDefender)
ClamAV
F-Secure Inc.
Fortinet Inc.
McAfee Inc.
ESET (Nod32)
Panda Software
Sophos Plc
Symantec Corp.
Trend Micro Inc.
VirusBuster
These products detected fewer variants:
62 — eTrust-VET
62 — QuickHeal
61 — AntiVir
61 — Dr Web
61 — Kaspersky
60 — AVG
19 — Command
19 — F-Prot
11 — Ewido
7 — eSafe
7 — eTrust-INO
6 — Ikarus
6 — VBA32
0 — Norman
The difference for the more effective products is likely to be heuristic detection, tracking the threat by identifying the basic techniques of the exploit, rather than looking for specific patterns for specific exploits.
|
#7 By
7754 (216.160.8.41)
at
1/3/2006 5:20:57 PM
|
Quoting the number that detect "all known variants" sort of misses the point, although even that is an important one. The fact that there are even 73 known variants already means that, to some degree, you have to rely upon heuristic detection, which is a crap shoot. Security researchers are saying that most AV solutions may not be up to the task due to the morphing capabilities of the known exploits.
|
#8 By
32132 (142.32.208.231)
at
1/3/2006 5:31:28 PM
|
A big thumbs up for heuristic detection is in order.
And hardware DEP.
Maybe I'm more complacent since I have both.
|
#10 By
2960 (68.101.39.180)
at
1/4/2006 1:59:49 PM
|
#1,
No time to worry about Unix bugs. The current one for Windows is keeping my queue active.
TL
|
#11 By
868449 (121.205.244.195)
at
11/23/2012 1:05:34 AM
|
Simply because the cost of everything keeps going up every year many men and women are finding that their present income isn't enough to cover their bills and so they search for ways to make some extra money. Quite a lot of these folks wind up turning to the Internet simply because they have heard that this can be a fantastic way to start earning some extra money or even making more money than they do with their current job. With regards to making money online you are going to see that plenty of individuals want to do this but don't understand how to start. The reality is that there are few different methods you can start making money on the web and we are talking about a number of them in this post.
<a href=http://www.cheapjordanskicks23.com/kids-jordan-shoes-c-188.html>wholesale jordans retro</a>
Making some extra cash is a thing that loads of men and women have to do right now just to get by, and you are going to find that there are multiple ways that this can be achieved. Something you might or may not be aware of would be that there loads of individuals right now attempting to make cash online because they heard this is actually a very viable option. With regards to making cash online you are going to discover that a lot of individuals want to do this but do not know how to start. The reality is that there are few different techniques you can start making money on the web and we will be talking about a number of them in the following paragraphs.
<a href=http://www.discount-airjordans.com/air-jordan-fusion-c-118.html>cheap air jordans free shipping</a>
|
#12 By
868449 (110.85.126.20)
at
11/26/2012 10:04:11 PM
|
For loads of folks nowadays cash is very tight, and as a result of this folks are trying to discover ways that they can supplement or even replace their current income. Many of these folks wind up turning to the Internet mainly because they have heard that this can be a wonderful way to start earning some extra money or even making more money than they do with their current job. The only problem is that plenty of men and women do not know how to start making cash from the Internet simply because they do not have the information that they need to be able to get started. The truth is that there are few different techniques you can begin making money on the internet and we are discussing a few of them in this article.
<a href=http://www.cheapjordanskicks23.com/kids-jordan-shoes-c-188.html>discount cheap jordans online</a>
Achieving success on the net is something that plenty of people have accomplished by using the 2 strategies above, but there are many other ways that you can begin earning money online. If you happen to be searching for some of these various other methods that we are speaking about, you'll have the ability to find a lot more information on the internet by working with one of the various search engines.
<a href=http://www.buyjordansgo.com/womens-jordan-shoes-c-139.html>jordan 11 greys for sale</a>
|
|
|
|
|