Microsoft security hole bugs Web-based email

Published: 15 March 2000 y., Wednesday
The hole could also potentially be used to create more significant system damage, experts say. The vulnerability, which was just discovered, works by forcing a computer to process a certain sequence of characters. A user could encounter this situation in several instances: when downloading a Web page that has been embedded with malicious code, when opening an email message on Hotmail or some other Web-based email service or simply by typing the code at a DOS prompt. When a computer encounters the sequence of characters and tries to process them, it crashes. "Basically, if you have a certain combination of certain strings in a file name, it gives the user the blue screen of death," said Elias Levy, chief technical officer at SecurityFocus.com and moderator of the BugTraq mailing list, which has been following the issue for the last week. Microsoft confirmed the vulnerability, which is a type of "Trojan horse," and said it is working on a patch. "It is a vulnerability in which Windows 9x machines can be caused to crash," a spokesperson said. "Microsoft is aware of the issue and is developing a patch that will eliminate it."
Šaltinis: Winfiles.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

12 New Mobile Processors

CeBIT: AMD Jump-Starts Competition In Thin-And-Light Notebook Market; Unveils 12 New Mobile Processors more »

search.lt news

search.lt presents newest links more »

Microsoft explores self-managing software

The company plans to unveil the initiative, called Dynamic Systems Initiative (DSI), at a Las Vegas conference next week when it debuts its new systems management tools more »

CeBit cleans up with new tech

Oracle deal: Good omen for Linux group? more »

DSL Leads Global Connections

Global DSL subscriptions nearly doubled during 2002, from 18.8 million to 35.9 million more »

Password-stealing e-mails spread

Scam widens; latest seeks Discover Card accounts more »

“Chief” level event

The ICT World Forum @ CeBIT 2003 more »

Deloder worm leaves behind two Trojan horses

The worm uses infected copies of remote-access app VNC and Internet-communications app IRC more »

Intel's New Wireless Platform: Centrino

After years of working with code-named chipsets and bundling the processors on a new platform, Intel Corp. Wednesday officially took the wraps of its latest Centrino technology more »

Two main problems

Europe finds MS guilty, but wonders what to do about it more »