Microsoft warns of flaw in newer Windows versions
Del.icio.us
Digg
Google
Spurl
Blink
Furl
Y! MyWeb
Share:
Sponsors:
Reuters
Microsoft Corp.warned users on Tuesday of a new "critical"-rated flaw in recent versions of Windows that could allow attackers to take control of a system by embedding malicious software code into digital images.
Users of
Windows XP, Windows Server and an updated version of
Windows 2000 were vulnerable to an attack unless they installed a software patch.
The flaw affects imaging technology used in Windows that could potentially allow an attacker to take control of a system simply by having the user view a digital image that contains software code that exploits the flaw.The top two providers of security software and services, Symantec Corp.and McAfee Inc.recommended that users install the patch and avoid opening suspicious e-mail attachments or clicking on any unfamiliar links.
"If a potential victim goes to a Web site and sees these files, they can be infected," said Monti Ijzerman, manager of security content at McAfee.
"The most the obvious thing is to deploy (install) the Microsoft security patches," Izjerman said.
Microsoft issued the patches as part of its monthly security bulletin, which it adopted in 2003 to make it easier for users and computer system administrators to install patches and keep track of vulnerabilities in Microsoft's software.
Users can also download the patches to fix the software flaws at www.microsoft.com/security.
Article submitted by: Webshark
Last Update: 11-09-2005
Category: Security
Microsoft Corp.warned users on Tuesday of a new "critical"-rated flaw in recent versions of Windows that could allow attackers to take control of a system by embedding malicious software code into digital images.
Users of
Windows XP, Windows Server and an updated version of
Windows 2000 were vulnerable to an attack unless they installed a software patch.
The flaw affects imaging technology used in Windows that could potentially allow an attacker to take control of a system simply by having the user view a digital image that contains software code that exploits the flaw.The top two providers of security software and services, Symantec Corp.and McAfee Inc.recommended that users install the patch and avoid opening suspicious e-mail attachments or clicking on any unfamiliar links.
"If a potential victim goes to a Web site and sees these files, they can be infected," said Monti Ijzerman, manager of security content at McAfee.
"The most the obvious thing is to deploy (install) the Microsoft security patches," Izjerman said.
Microsoft issued the patches as part of its monthly security bulletin, which it adopted in 2003 to make it easier for users and computer system administrators to install patches and keep track of vulnerabilities in Microsoft's software.
Users can also download the patches to fix the software flaws at www.microsoft.com/security.
Article submitted by: Webshark
Last Update: 11-09-2005
Category: Security
Current rating: 5.45 by 46 users
Would you recommend this article to a friend? |
Not a Chance | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Absolutely |
Related News Stories
(9,429 reads) 07-05-2008
· Fusion Security(15,118 reads) 06-02-2007
· NukeSentinel(tm)2.5.10 Critical Update(13,880 reads) 05-07-2007
· NukeSentinel(tm) 2.5.08 Maintainance Release(15,348 reads) 03-15-2007
· NukeSentinel(tm) 2.5.07 Reissued: Critical Update(13,852 reads) 03-02-2007
· NukeSentinel(tm) 2.5.06: Critical Update(14,602 reads) 01-23-2007
· NukeSentinel(tm) 2.5.05 released(14,630 reads) 12-24-2006
· NukeSentinel 2.5.04 released(14,358 reads) 11-03-2006
· NukeSentinel(tm) 2.5.03 Released(18,199 reads) 10-19-2006
· Php Nuke 8.0 Patched(14,586 reads) 10-01-2006
· ipBan Modification
Please register or sign-in to post comments.