SP2 Users Insulated From JPEG Flaw
Microsoft’s monthly security bulletin has uncovered a Â’critical’ buffer overrun vulnerability that exists in the processing of JPEG image formats. The flaw could allow hackers to remotely execute malicious code, thereby placing affected machines under high risk.
However, Microsoft’s highly secure nutshell, i.e. Windows XP Service Pack 2 (XP SP2), has successfully managed to mitigate the risk.
If a user is logged on with administrator privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Windows XP, Window XP Service Pack 1, and Windows Server 2003 are the only operating systems that contain the vulnerable component by default. By default, Windows 98, Windows 98 SE, Windows Me, Windows NT 4.0, and Windows 2000 are not vulnerable. However, the vulnerable component will be installed by any of the programs listed in the affected software section. Affected systems should be vaccinated immediately, recommends Microsoft.
- AI Raises Serious Security Concerns, Say Researchers
- Study Reveals Why CISO Should Report To The CEO
- CXOs Still Wary Of Cloud Data Security: Study
- PNB Scam: Some Tech Lessons For Indian Banks
- Why Financial Sector CIOs Should Get On Top Of Machine Learning
- Unnecessary Security Cordons Make Fintech More Vulnerable
- Direct Co-ordination With CEO Can Maximise Cyber Security
- How To Become Cisco CCNA Security 210-260 Certified
- Cyber Security: Challenges And Potential For Indian Businesses
- F Secure Is Growing Much Faster Than The Market