[ anon68680 @ 16.11.2009. 12:22 ] @

http://computerworld.co.nz/new...592E1A9719742ACC25766F0066B38D


Citat:
In a security advisory, Microsoft acknowledged that a bug in SMB (Server Message Block), a Microsoft-made network file- and print-sharing protocol, could be used by attackers to cripple Windows 7 and Windows Server 2008 R2 machines.

The zero-day vulnerability was first reported by Canadian researcher Laurent Gaffie last Wednesday, when he revealed the bug and posted proof-of-concept attack code to the Full Disclosure security mailing list and his blog. According to Gaffie, exploiting the flaw crashes Windows 7 and Server 2008 R2 systems so thoroughly that the only recourse is to manually power off the computers.



MS jos uvek nije izjavio da li ce patchovati problem, pre regularnog patch day-a (8 decembar). Do tada se savetuje da ,ako vec niste, blokirate 139 i 445 portove.
[ bachi @ 16.11.2009. 17:00 ] @
Čoveče, pa dokle više. 15 godina ista stvar.
[ boxxter @ 16.11.2009. 17:10 ] @
http://www.elitesecurity.org/t...e-kernel-crasher-code-released