The code that exploits the Windows 2000 error appears
Security firm Symantec, on May 25, warned of a new security breach in Windows 2000 file sharing procedures.
It is known that this security error arises in the procedure of sharing SMB (Server Message Block) file of Windows 2000. Security firm Immunity Security has successfully developed the code successfully exploiting this vulnerability. It is expected that this code will be announced next month.
Immunity researcher Dave Aitel affirmed that the exploit code developed by the company will take advantage of the vulnerability in the kernel of the operating system via SMB protocol to gain full access to the infected system. .
' Immunity is considered a very reliable source of information and we think this is a reliable information ,' Symantec warned. ' Certainly, Microsoft will not release an official patch until the details of this security bug are released .'
Therefore, Symantec now recommends that users should apply SMB services on some servers. Or if possible, upgrade to a new version of Windows.
The final patch for security vulnerabilities arising from the SMB procedure is in Windows 2000 that was released in June last year.
Although Microsoft claims to stop supporting Windows 2000 since June 2005, developers continue to develop patches for this operating system.
Hoang Dung
- The Windows error code appears
- The code for exploiting the WMP security error appears
- Hackers exploit new Windows vulnerabilities
- Code to exploit Windows operating system
- Appears dangerous code exploiting Oracle error
- Appear malicious code to attack Windows Help error
- Fix the error not turned off
- Disseminate dangerous code to exploit Windows errors
- An Oracle error exploit code appears
- Windows Core Services XML has a fatal error
- Where does the error 'Error 404' come from?
- Edit the Boot.ini file in Windows XP