Visa Security Flaws Prior to Consumer Release


Now Vista is actually out we haven’t heard much about it, before it’s commercial release however there was a lot of flaws released and discussion about the (in)security of the OS. The architecture does seem a lot better..

But still it’s from Microsoft, how long until we get a remote root exploit giving the highest level of access. They even tried to lock security vendors out from the Kernel for a while.

One full month before Microsoft Windows Vista ships to consumers, hackers and security experts have already discovered six serious flaws in the operating system. Vista was made available to business customers one month ago. Since then, the experts have been throwing everything they can come up with at this build of Vista hoping to discover possible vulnerabilities before the general public starts running the OS on their home machines.

There were some others too, unsurprisingly a lot were based around Internet Exploder 7.

Here are some of the flaws, paraphrased from the NYT story:

  • Determina discovered a bug in Internet Explorer 7 that allows malware to be surreptitiously installed on a user’s computer if he visits a “booby-trapped site” while browsing the web.
  • Determina also discovered a way to disable a network’s Microsoft Exchange server by sending an infected email.
  • An unnamed Russian programmer discovered a way to hack his user permissions on all Windows systems on a corporate network using a Vista exploit. This is particularly dangerous, since a hacker could use his increased privileges to circumvent IE7’s built-in sandbox controls.
  • Tokyo-based company Trend Micro has discovered a hacker on a Japanese message board offering to sell information about a Vista security flaw for $50,000.

From what I’ve seen around…there are serious exploits for Vista and IE7 for sale if you know where to look.

Source: Wired Blog

Posted in: Exploits/Vulnerabilities, Windows Hacking

, , , , , ,


Latest Posts:


zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Sandcastle is an Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify).
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network


One Response to Visa Security Flaws Prior to Consumer Release

  1. SN July 2, 2007 at 3:00 pm #

    The MS at it again. I went a MS conference last year in NYC and one of the chief security architects when asked about the holes in XP, to the humor of the audience, said that it was job security to have holes. This was a joke.

    -SN