{"id":42836,"date":"2009-11-16T11:02:26","date_gmt":"2009-11-16T16:02:26","guid":{"rendered":"http:\/\/www.crunchgear.com\/?p=124545"},"modified":"2009-11-16T11:02:26","modified_gmt":"2009-11-16T16:02:26","slug":"windows-7-exploit-the-first-confirmed-by-microsoft","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/42836","title":{"rendered":"Windows 7 exploit (the first?) confirmed by Microsoft"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.crunchgear.com\/wp-content\/uploads\/2009\/11\/win7.png\" alt=\"win7\" title=\"win7\" width=\"250\" height=\"40\" class=\"alignleft size-full wp-image-124546\" \/><\/p>\n<p><A HREF=\"http:\/\/www.crunchgear.com\/tag\/windows-7\/\">Windows 7<\/A> users would be well-advised to block outgoing ports 139 and 445. Microsoft <A HREF=\"http:\/\/computerworld.co.nz\/news.nsf\/scrt\/E9592E1A9719742ACC25766F0066B38D\">has confirmed the existence of a vulnerability<\/A> that affects <A HREF=\"http:\/\/en.wikipedia.org\/wiki\/Server_Message_Block\">SMB<\/A> in Windows 7 and Windows Server 2008 RC2. Worst case scenario: you connect to a malicious server then it crashes your PC.<\/p>\n<p>The beauty here is that, in a perfect world, these ports would be blocked by default, making the exploit much less troubling. Let&#8217;s say you&#8217;re messing around on your computer, and all of a sudden Windows (or your firewall of choice) prompts you to open port 445 for a connection. So you say to yourself, \u201cHmm, I&#8217;m pretty sure my game of chess doesn&#8217;t need to access an SMB share to work properly, so I&#8217;m going to go ahead and deny that port-open request.\u201d<\/p>\n<p>But that&#8217;s now how the real world works.<\/p>\n<p>It comes down to this: block those two ports when you&#8217;re not actively using them. No problems.<\/p>\n<p>I could make some sort of snide remark about this being the first of many (maybe!) Windows 7 exploits, but let&#8217;s face it: when you&#8217;re dealing with so many lines of code, you&#8217;re bound to find a few bugs in there. <\/p>\n<p>Oh, and Microsoft hasn&#8217;t said when it plans to patch the exploit. Presumably it will do so with its next big first Tuesday of the month patch day.<\/p>\n<p>via <A HREF=\"http:\/\/it.slashdot.org\/story\/09\/11\/16\/0113249\/The-First-Windows-7-Zero-Day-Exploit\">Slashdot<\/A><\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/3dQ6GQl10Aj2RVDPnmx-RbkcHmo\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/3dQ6GQl10Aj2RVDPnmx-RbkcHmo\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/3dQ6GQl10Aj2RVDPnmx-RbkcHmo\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/3dQ6GQl10Aj2RVDPnmx-RbkcHmo\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=UdmurDkI9Yg:0T6U2iviCjA:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?i=UdmurDkI9Yg:0T6U2iviCjA:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=UdmurDkI9Yg:0T6U2iviCjA:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?i=UdmurDkI9Yg:0T6U2iviCjA:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=UdmurDkI9Yg:0T6U2iviCjA:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Windows 7 users would be well-advised to block outgoing ports 139 and 445. Microsoft has confirmed the existence of a vulnerability that affects SMB in Windows 7 and Windows Server 2008 RC2. Worst case scenario: you connect to a malicious server then it crashes your PC. The beauty here is that, in a perfect world, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-42836","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/42836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=42836"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/42836\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=42836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=42836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=42836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}