Jump to content

Microsoft issues security alert for new Windows XP and Windows Server 2003 exploit


ShyWriter

Recommended Posts

.

Microsoft issues security alert for new Windows XP and Windows Server 2003 exploit

 

27 November 2013

 

2_1_1_windows_xp_sp3.jpg

 

 

Microsoft is now less than five months away from cutting off support to Windows XP, but before that happens the company is still issuing new security alerts for the OS. The latest such advisory was issued earlier today and also affects Windows Server 2003.

 

Microsoft's Security Response Center blog has the details on the advisory, which is due to a local privilege escalation exploit that was first discovered by the FireEye research firm. FireEye states, "The vulnerability cannot be used for remote code execution but could allow a standard user account to execute code in the kernel."

 

Microsoft says that Windows XP and Server 2003 users must open a malicious PDF file to be affected by this new exploit. While Microsoft is working on a full patch that will permanently close this hole, it does recommend that users delete their NDProxy.sys file and reroute to Null.sys. The company has determined that this will be an effective workaround until a patch is released.

 

The blog adds, "We hope this doesn’t disrupt any holiday plans you may have, but we did want to provide you with actionable information to help protect your systems. We continue to monitor the threat landscape closely and will take appropriate action to help protect customers."

 

Source: Microsoft | Image via Microsoft

 

/Steve

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.