SP2 Users Insulated From JPEG Flaw
Microsoft’s monthly security bulletin has uncovered a Â’critical’ buffer overrun vulnerability that exists in the processing of JPEG image formats. The flaw could allow hackers to remotely execute malicious code, thereby placing affected machines under high risk.
However, Microsoft’s highly secure nutshell, i.e. Windows XP Service Pack 2 (XP SP2), has successfully managed to mitigate the risk.
If a user is logged on with administrator privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Windows XP, Window XP Service Pack 1, and Windows Server 2003 are the only operating systems that contain the vulnerable component by default. By default, Windows 98, Windows 98 SE, Windows Me, Windows NT 4.0, and Windows 2000 are not vulnerable. However, the vulnerable component will be installed by any of the programs listed in the affected software section. Affected systems should be vaccinated immediately, recommends Microsoft.
- The Digital Messiah: Inside Accenture's Innovation Hub
- Edge Computing Drives Internet Of Thing's Growth: Study
- Iris Global On Expansion Spree; Ventures Into India's Cyber Security Biz
- 5 Steps CISOs Can Implement to Enhance Customer Experience
- Top Tips To Avoid Last-Minute GDPR â€˜Crammingâ€™
- NIC Steps Up Its Efforts To Hire More Cyber Security Pros
- Building Better Data Protection and Steering Clear of GDPR Violations
- GDPR Law Boosts Cyber Security Jobs in India: Study
- When Securing Customer Loyalty Becomes Critical
- What's Stopping CEOs From Meeting Growth Targets