Microsoft Confirms Zero-Day ''Shortcut'' Exploit

Status
Not open for further replies.
And they are just announcing/addressing this now, this exploit has been a big pain in the ass at work for months, I've had tons of users using there usb keys, and infecting crap.
 
This only applies to Windows XP, 7 has autorun disabled, so no clients had this problem.. just let XP die..
 
Microsoft should be paying potential hackers to find these problems instead of letting the Chinese or Terrorists or people with too much time on their hands find them, and then coming up with fixes.

I think all in all it will be cheaper and make for a safer environment for everyone.

Just my two cents.
 
@gaevs:
from the article
"For consumers who have AutoPlay disabled, they would need to manually browse to the root folder of the removable disk in order for the vulnerability to be exploited."
.
Seems to me if a user put a USB in their computer, one *very* likely scenario is browsing the USB to see what is on it. It affects XP SP2 to Win7 whether you want to admit it or not. ;-)
 
[citation][nom]obiown77[/nom]And they are just announcing/addressing this now, this exploit has been a big pain in the ass at work for months, I've had tons of users using there usb keys, and infecting crap.[/citation]

But normally, the infection comes from what the autorun is launching, not the autorun shortcut itself.



[citation][nom]gaevs[/nom]This only applies to Windows XP, 7 has autorun disabled, so no clients had this problem.. just let XP die..[/citation]


Um... no it doesnt.
 
wait let me get this right.... for this to work someone has to physically plug the thing into my USB port.... the last time i let a stranger do that was.....
 
What Noodlegts said, and as well, I think Microsoft should stop pouring so much time into XP, they said they were going to let it die, and now they've changed their minds.
 
[citation][nom]gaevs[/nom]This only applies to Windows XP, 7 has autorun disabled, so no clients had this problem.. just let XP die..[/citation]

the issue isnt with Autorun

For consumers who have AutoPlay disabled, they would need to manually browse to the root folder of the removable disk in order for the vulnerability to be exploited.

All you would have to do is navigate to the folder that has the infected file (link) in it.
 
I still don't understand why Microsoft allows code from so many different places to execute. Why would you ever need to execute data found in an email, jpg file, or shoftcut file? It's just data, stop executing it!
 
I agree any security holes should be fixed, but why is this a big problem? Who is plugging USB drives into your computer with viruses on it?
 
[citation][nom]obiown77[/nom]And they are just announcing/addressing this now, this exploit has been a big pain in the ass at work for months, I've had tons of users using there usb keys, and infecting crap.[/citation]

How were they getting those drives infected in the first place?
 
Guess, it is just impossible to make an OS without any security hole/backdoor... .... even after so many patches...

I know it is much harder to build one than destroy one... but after so many patches/years/OS generations... we are still finding more holes to fix... hmmm...
 
So how do you get the malicious code onto your USB drive to begin with?
 
[citation][nom]stm1185[/nom]So how do you get the malicious code onto your USB drive to begin with?[/citation]

Probably your wonderful friends/GF/wife who has/have no idea about what antivirus software/spybot is... or once in a while from a new UBS drive when the virus/malicious code is "accidently" factory pre-installed! (which actually happened before).
 
[citation][nom]pharge[/nom]Guess, it is just impossible to make an OS without any security hole/backdoor... .... even after so many patches...I know it is much harder to build one than destroy one... but after so many patches/years/OS generations... we are still finding more holes to fix... hmmm...[/citation]
Wrong. It is possible. OpenBSD has only two remote exploits in the past 12 years. Microsoft has more than two *thousand* remote exploits in the past 12 years. Food for thought.
 
Status
Not open for further replies.