Windows Core Services XML has a fatal error

Of the Heap buffer overflow type and severely evaluated affect most of today's popular Windows operating systems, vulnerabilities in ActiveX XMLHTTP in Windows Core Services 4.0 and 6.0, can be exploited. to execute the attack code.

To exploit this error, the hacker will have prepared dangerous code (code used to attack, hijack, also called shellcode) and then insert an e-mail or web page. Then send an email or link to this site for victims to trick them into clicking. As soon as the "prey" traps, clicks on the link or reads the e-mail, shellcode will be executed and the attacker can install malware to hijack the victim's computer.

Picture 1 of Windows Core Services XML has a fatal error This is a dangerous error, however, this vulnerability is unlikely to cause widespread explosion because of which operating system you want to target (Windows2000, WindowsXP SP1, SP2 .), the attacker must create dangerous code. exclusively for that software. Not to mention, each operating system itself has different versions (Build Number different) and each such program also needs different dangerous code. This heterogeneity will be a barrier for attackers who want to create outbreaks.

But this error is really dangerous in the case of intentional attacks, ie hackers target a specific computer. With careful preparation, the villain knows what the victim uses the operating system and what version, he can crumble, take control of any Windows system through "black hole." "This. " As soon as the vulnerability was announced, some websites around the world also provided shellcode to exploit. We think that these shellcode only succeed on some versions of Windows 2000 and XP operating systems, so it is not enough to cause new explosive attacks ".

Microsoft has released this patch. Users can update here.

Xuan Kim