Critical bug in 40 Windows apps!

Moderators: b1o, jkerr82508

User avatar
viking60
Über-Berserk
Posts: 9351
Joined: 14 Mar 2010, 16:34

Critical bug in 40 Windows apps!

Postby viking60 » 23 Aug 2010, 19:36

A “binary planting” vulnerability in Apple iTunes for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
Critical bug in 40 apps


Since Windows systems by default have the Web Client service running - which makes remote network shares accessible via WebDAV -, the malicious DLL can also be deployed from an Internet-based network share as long as the intermediate firewalls allow outbound HTTP traffic to the Internet.

A systematic attack could deploy malicious code to a large number of Windows workstations in a short period of time, possibly as an Internet worm.

Now you know :!:
Manjaro 64bit on the main box -Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz and nVidia Corporation GT200b [GeForce GTX 275] (rev a1. + Centos on the server - Arch on the laptop.
"There are no stupid questions - Only stupid answers!"

User avatar
dedanna1029
Sound-Berserk
Posts: 8784
Joined: 14 Mar 2010, 20:29
Contact:

Re: Critical bug in 40 Window apps!

Postby dedanna1029 » 23 Aug 2010, 20:04

Man alive, will this kind of thing never stop with them? Every time one turns 'round there's another one in Windows.
I'd rather be a free person who fears terrorists, than be a "safe" person who fears the government.
No gods, no masters.
"A druid is by nature anarchistic, that is, submits to no one."
http://uk.druidcollege.org/faqs.html

User avatar
gnuuser
Berserk
Posts: 449
Joined: 18 Aug 2010, 21:52
Location: northwestern Pa.
Contact:

Re: Critical bug in 40 Window apps!

Postby gnuuser » 23 Aug 2010, 20:51

Ive stated in other forums that windows code is too buggy!
with so many programmers developing a program or app
they each create their own back doors and alternate entrance points in the code
(example on average they may have 30 or 40 people working on one app alone that's a lot of holes in the program)
they are supposed to remove them all but if a product is rushed through it rarely gets done.
some are even left intentionally.
an intensive debugging program can find the holes and these points are what gets exploited and targeted for attacks
and it doesn't help that they use a single large partitioning scheme!
registered Linux user number 505431
Amateur radio call sign KC3TEC
miracle (mere-ack-ull) :
the aspiration of the indigent, the expectation of the indolent, and the inspiration of the ignorant.

Im so old even dirt was my apprentice!


Return to “Win News”