The first Windows 7 vulnerability proves that the Microsoft SDL process failed.

  

Windows 7 has escaped the monthly patching process performed this week, but has not escaped the attention of hackers. Some security researchers say they have discovered the first zero-day attack security vulnerability in Windows 7. Microsoft is investigating this issue.

Security researcher Laurent Gaffié called Microsoft on Wednesday (November 11) to criticize Microsoft's SDL (Security Development Lifecycle) process. He also published a proof of concept using this vulnerability code. He said the code that exploits security vulnerabilities could crash Windows 7 and Windows Server 2008 R2 systems.

Gaffié said in a blog post that this security hole is a real proof of SDL failure. This security hole is very simple. If there is SDL, this security vulnerability should have been discovered two years ago.

The core of this vulnerability is the SMB (Server Message Block) protocol, which is the basis for Windows file sharing. According to Gaffié, this security vulnerability caused an infinite loop of the SMB protocol and could cause this failure remotely through Internet Explorer. Gaffié notified Microsoft of this vulnerability on November 8th before releasing the proof of concept using the vulnerability code on November 11.

Although Microsoft has indeed had security vulnerabilities in the SMB protocol in the past, security researchers point out that using the default firewall to set up such security vulnerabilities is difficult to exploit. There is a way to circumvent this vulnerability: block routers or ports 135, 139, and 445 on the firewall to prevent external SMB traffic from entering the system.

ChetWisniewski, senior security consultant at antivirus software company Sophos, was not surprised by the fact that Windows 7 was released so quickly that security vulnerabilities were discovered. He said that this is because the Windows 7 code was finalized this summer. Attackers have a lot of time to find security holes in them. This security hole is not difficult to find, which causes the attacker to boast of himself, saying how foolish Microsoft is to exploit this security hole.

This vulnerability is currently not dangerous to users. As Gaffié points out, exploiting this vulnerability can cause a host crash. This means that the computer will be restarted. Wisniewski pointed out that this zero-day attack security vulnerability has not been in the form of a worm so far, only for Windows 7 and Windows Server 2008 R2. This means that this attack is currently only a denial of service attack.

Copyright © Windows knowledge All Rights Reserved