Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: Windows 7 UAC flaw silently elevates malware access---Weak links in chain of trust

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____/ Investigative Reporter Web server on Wednesday 04 February 2009 22:30 :
\____

> 
> 
> nessuno@xxxxxxxxxxxxxxxxxxx wrote:
>> <Quote>
>> Researchers have uncovered yet another flaw in Microsoft's Windows 7
>> beta that could allow attackers to gain full administrative privileges
>> by bypassing the operating system's UAC, or user access control....
>> 
>> "Unfortunately this flaw is not just a single point of failure,"
>> writes security blogger Long Zheng. "The breadth of Windows
>> executables is just too many and too diverse and many are
>> exploitable." ...
>> </Quote>
>> 
>> http://www.theregister.co.uk/2009/02/04/windows_uac_flaw/
> 
> <Quote>
> Both researchers say they've received word that Microsoft has already
> changed the UAC behavior in internal Windows 7 builds. A Microsoft
> spokesman said he was looking into the matter. We'll update if we hear
> back. In the meantime, Windows 7 users may want to set UAC to "high."
> <Quote>

They must already be "high" is they run BetaVista7.

- -- 
                ~~ Best of wishes

Roy S. Schestowitz      |    Open Source Othello: http://othellomaster.com
http://Schestowitz.com  |    RHAT Linux     |     PGP-Key: 0x74572E8E
 23:05:01 up 13 days,  7:51,  2 users,  load average: 0.79, 0.95, 1.02
      http://iuron.com - Open Source knowledge engine project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkmKICEACgkQU4xAY3RXLo71HACghXpM0yYmM/rVdNQV4Lz2InFq
91cAoJ4ZHFjFTQLgelzQZEMvSyqAiyUQ
=1XWv
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index