{"id":2413,"date":"2008-10-10T00:00:00","date_gmt":"2008-10-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/10\/10\/exploit-code-loose-for-six-month-old-windows-bug\/"},"modified":"2021-12-30T11:41:18","modified_gmt":"2021-12-30T11:41:18","slug":"exploit-code-loose-for-six-month-old-windows-bug","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/10\/10\/exploit-code-loose-for-six-month-old-windows-bug\/","title":{"rendered":"Exploit code loose for six-month-old Windows bug"},"content":{"rendered":"<p>On Thursday, Microsoft revised a security advisory it first posted April 19 about a bug in Windows XP, Vista, Server 2003 and Server 2008 that could be exploited to gain additional privileges on vulnerable machines.   &#8220;Exploit code has been published on the Internet for the vulnerability addressed by this advisory,&#8221; confirmed Bill Sisk, a communications manager at Microsoft&#8217;s Security Response Center in a post to the MSRC blog.   In late March, Argentinean security researcher Cesar Cerrudo announced he had found a bug that could let attackers bypass some of the security schemes in the newest versions of the operating system, including Windows Server 2008.  &#8220;Basically, if you can run code under any service in Windows Server 2003 then you can own Windows,&#8221; he added.  Microsoft has yet to issue a fix for the flaw; since April its own move has been to recommend work-arounds for customers running Internet Information Services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We will continue to monitor the situation and post updates to the advisory and the MSRC blog as we become aware of any important new information,&#8221; he said yesterday.<\/p>\n<p>Also on Thursday, Microsoft published its monthly pre-patch notice outlining what would be fixed next week.  Although six of the 11 expected updates will affect Windows, and two of those six will affect the editions called out by the April advisory, Microsoft does not provide enough detail prior to patching to determine whether one of those will fix the privilege elevation flaw.<\/p>\n<p>http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9116924&#038;source=NLT_PM&#038;nlid=8<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2413","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2413"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2413\/revisions"}],"predecessor-version":[{"id":4900,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2413\/revisions\/4900"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}