![]() ![]() A simple registry tweak can immunise an XP computer against the vulnerability.No formal patch or Fixit has been published yet.The vulnerability exists in Windows XP and Server 2003 only. ![]() The exploit doesn’t allow remote code execution on its own, only an elevation of privilege (EoP).The bug is in the NDPROXY.SYS driver, which co-ordinates the operation of Microsoft’s Telephony API (TAPI).That makes it rather hard to decide exactly how to respond, but here’s what we know so far: Microsoft has gone public to warn about a zero-day vulnerability in the Windows XP kernel.Īpparently, the bug, dubbed CVE-2013-5065, is being exploited in the wild, though details of exactly how, where, by whom and to what effect are not known.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |