BIG SURPRISE: Not safe to use Windows today.
FYI
Microsoft has completed development of the security update for the vulnerability. The security update is now being localized and tested to ensure quality and application compatibility. Microsoft
Microsoft has completed development of the security update for the vulnerability. The security update is now being localized and tested to ensure quality and application compatibility. Microsoft
Originally Posted by exceltoexcel,Jan 3 2006, 04:38 PM
You're correct, You bought that hyper threading processor so it will sit there and do nothing? Microsoft had that beta out there for a long time, even offered free upgrades.
I have the other perspective how long should it take to have software that finally utilizes the hardware? 1 year 2 years?
I was pissed by microsoft draggin their feet and even more so by hardware manufacturers not bringing 64-bit drivers to market quick enough. Or intel finally getting a 64-bit processor after AMD. How are we ever going to move forward if everyone keeps dragging their feet?
I was pissed by microsoft draggin their feet and even more so by hardware manufacturers not bringing 64-bit drivers to market quick enough. Or intel finally getting a 64-bit processor after AMD. How are we ever going to move forward if everyone keeps dragging their feet?
Originally Posted by jasonw,Jan 3 2006, 07:47 PM
2 weeks :golfclap:
I still think thats a pretty good response time. Yes it stinks that this hole was there, its been there for a long time and only recently (after Microsoft basically told everyone that it was there
) did anyon attempt to exploit it.
Originally Posted by exceltoexcel,Jan 3 2006, 04:36 PM
So either you don't make software that works on Microsoft OS
Originally Posted by exceltoexcel,Jan 3 2006, 07:41 PM
Couldn't you just have your firewall block wmp files and be done with it. I mean quick fix until the hole is plugged
But how would you suggest configuring such a firewall? You'd have to write a firewall that understand the HTTP protocol, and knows to block when your machine requests a WMF file. Then of course, someone could make you download via FTP, so your firewall would need to understand that too.
But what if it comes as an e-mail attachment?
Is your firewall supposed to inspect every byte in every packet that comes into your computer, searching for what resembles a WMF file header?
I just can't see such a solution working.
And in all honesty, while I'm not sure about the DEP solution, I'm not even sure if that'll work. I haven't seen any information that suggests that this is a buffer overrun type problem yet. Did you try enabling DEP and clicking on Jason's link btw?
Originally Posted by PeaceLove&S2K,Jan 3 2006, 07:40 PM
But how would you suggest configuring such a firewall? You'd have to write a firewall that understand the HTTP protocol, and knows to block when your machine requests a WMF file. Then of course, someone could make you download via FTP, so your firewall would need to understand that too.
But what if it comes as an e-mail attachment?
But what if it comes as an e-mail attachment?
I would not call this a solution though. Only a workaround like the steps I posted for disabling the DLL. You are sacrificing part of the product's functionality. It would be like Honda saying not to rev the S2000 > 6,000 rpms to prevent a scorched #1 cylinder. Sure, it may prevent the problem. But that would also be a workaround and not a solution. A solution lets you use the product as it is intended while fixing the defect.
Originally Posted by jasonw,Jan 3 2006, 11:46 PM
It is possible for a firewall to understand HTTP, FTP(This is actually very useful), SMTP, etc, etc. It just takes more processing power. Then again, the data may be encrypted...
I would not call this a solution though. Only a workaround like the steps I posted for disabling the DLL. You are sacrificing part of the product's functionality. It would be like Honda saying not to rev the S2000 > 6,000 rpms to prevent a scorched #1 cylinder. Sure, it may prevent the problem. But that would also be a workaround and not a solution. A solution lets you use the product as it is intended while fixing the defect.
I would not call this a solution though. Only a workaround like the steps I posted for disabling the DLL. You are sacrificing part of the product's functionality. It would be like Honda saying not to rev the S2000 > 6,000 rpms to prevent a scorched #1 cylinder. Sure, it may prevent the problem. But that would also be a workaround and not a solution. A solution lets you use the product as it is intended while fixing the defect.
The sky isn't falling, and yet another exploit for Windows via email attachments is hardly cause for concern. Hell, the default setting on Outlook restricts attachments, so if you can't be bothered to change even a single setting, you won't be getting attachments as it is.



