Windows 7 has escaped the monthly patching process performed this week, but has not escaped the attention of hackers. Some security researchers say they have discovered the first zero-day attack security vulnerability in Windows 7. Microsoft is investigating this issue.
Security researcher Laurent Gaffié called Microsoft on Wednesday (November 11) to criticize Microsoft's SDL (Security Development Lifecycle) process. He also published a proof of concept using this vulnerability code. He said the code that exploits security vulnerabilities could crash Windows 7 and Windows Server 2008 R2 systems.
Gaffié said in a blog post that this security hole is a real proof of SDL failure. This security hole is very simple. If there is SDL, this security vulnerability should have been discovered two years ago.
The core of this vulnerability is the SMB (Server Message Block) protocol, which is the basis for Windows file sharing. According to Gaffié, this security vulnerability caused an infinite loop of the SMB protocol and could cause this failure remotely through Internet Explorer. Gaffié notified Microsoft of this vulnerability on November 8th before releasing the proof of concept using the vulnerability code on November 11.
Although Microsoft has indeed had security vulnerabilities in the SMB protocol in the past, security researchers point out that using the default firewall to set up such security vulnerabilities is difficult to exploit. There is a way to circumvent this vulnerability: block routers or ports 135, 139, and 445 on the firewall to prevent external SMB traffic from entering the system.
ChetWisniewski, senior security consultant at antivirus software company Sophos, was not surprised by the fact that Windows 7 was released so quickly that security vulnerabilities were discovered. He said that this is because the Windows 7 code was finalized this summer. Attackers have a lot of time to find security holes in them. This security hole is not difficult to find, which causes the attacker to boast of himself, saying how foolish Microsoft is to exploit this security hole.
This vulnerability is currently not dangerous to users. As Gaffié points out, exploiting this vulnerability can cause a host crash. This means that the computer will be restarted. Wisniewski pointed out that this zero-day attack security vulnerability has not been in the form of a worm so far, only for Windows 7 and Windows Server 2008 R2. This means that this attack is currently only a denial of service attack.
The difference is that the configuration requirements are different64-bit operating system can only
In the daily use of the computer, whether the network connection is in the wired network or the wire
Nowadays, many notebooks and desktops have multiple network cards. The more common ones are wired ne
Many friends responded to the author. After installing win7, you cant use the hibernation function.
How to upgrade directly from Vista to Windows 7
Solve the problem that WIN7 notebook can't connect to wireless network
The difference between WinSDN MSDN version, OEM version, RTM version, VOL version
How to improve the utilization of win7 memory
Win7 under the use of CCB GES usb (latest discovery)
XP and WIN7 dual system operating system installation tutorial
U disk installation Win7 system tutorial
Do your best to use the win 7 Favorites feature
How to make the chassis and headphones sound at the same time in win7 computer
Explain the principle of Windows 7 "God Mode"
How to use the Heiner River Downloader? Heiner Baichuan Downloader Usage Method
What should I do if the network connection fails after the win8 system update?
QQ computer housekeeper suspends the announcement of Win10 upgrade service
Explain the 15 shortcuts that must be known in Windows 7 system
Win10 task manager prompts disk 100% optimization method
What should I do if Win8.1 is reconnected every time I use a Bluetooth headset?
Linux method for creating custom Docker images
Win10 Mobile Preview 14383 has been fixed and known issues summary
Sword spirit civilian silk reel players to make money Raiders