V
Virus Guy
XP.
What a joke.
This is an example of Macro$haft support for a "supported product" ?
How many bandaids can you (should you) apply to a product before it
should rightly be declared "dead on arrival" ???
Windows 98(se) was better "out-of-the-box" than XP is even now.
-------------
http://secunia.com/product/16/
Microsoft Windows XP Home Edition with all vendor patches installed
and all vendor workarounds applied, is currently affected by one or
more Secunia advisories rated Highly critical.
This is based on the most severe Secunia advisory, which is marked as
"Unpatched" in the Secunia database. Go to Unpatched/Patched list
below for details.
(http://secunia.com/product/16/#advisories)
Currently, 23 out of 116 Secunia advisories, are marked as "Unpatched"
in the Secunia database.
-------------
http://secunia.com/product/13/
Microsoft Windows 98 Second Edition with all vendor patches installed
and all vendor workarounds applied, is currently affected by one or
more Secunia advisories rated Less critical
This is based on the most severe Secunia advisory, which is marked as
"Unpatched" in the Secunia database. Go to Unpatched/Patched list
below for details.
(http://secunia.com/product/13/#advisories)
Currently, 3 out of 30 Secunia advisories, are marked as "Unpatched"
in the Secunia database.
--------------
Here are the 3 unpatched Win-98 issues (all of which either cause
trivial problems or require physical access to the system). It
appears that only the legacy installation of Microsoft Java represents
any real lingering threat to Windows 98(se) systems that are otherwise
fully patched and updated.
--------------
1) Windows buffer overflow in riched20.dll
http://secunia.com/advisories/8099/
The vulnerability is caused by a boundary error in the dynamic link
library "riched20.dll" in the function that draws figure strings. This
can be exploited by constructing a malicious ".rtf" file where the
figure string sets a font size larger than 1024 bytes and luring a
user to open the file. Any application using the vulnerable function
in "riched20.dll" will crash.
Solution: Do not open files with RTF content from untrusted sources.
----------------
2) Microsoft Java Virtual Machine Cross-Site Communication
Vulnerability
http://secunia.com/advisories/12047/
Marc Schoenefeld has reported a vulnerability in Microsoft Java
Virtual Machine, allowing Java applets originating from different
domains to communicate.
The problem is that applets share a common class loader for the system
classes, allowing sites to use public static fields for Cross-Site
communication. This could potentially be exploited to cause
information leakage.
This is a breach of sandbox restrictions.
The vulnerability has been reported in version 5.0.0.3810. Other
versions may also be affected.
Solution: Use another Java implementation.
----------------
3) Microsoft Windows Unspecified USB Device Driver Vulnerability
http://secunia.com/advisories/16210/
A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people with physical access to a vulnerable
system to compromise it.
The vulnerability is caused due to an unspecified boundary error in a
USB device driver and can be exploited to cause a buffer overflow via
a specially crafted USB device.
Successful exploitation allows execution of arbitrary code with SYSTEM
privileges, but requires physical access to a vulnerable system
Solution: Restrict physical access to vulnerable systems.
Disable USB support.
What a joke.
This is an example of Macro$haft support for a "supported product" ?
How many bandaids can you (should you) apply to a product before it
should rightly be declared "dead on arrival" ???
Windows 98(se) was better "out-of-the-box" than XP is even now.
-------------
http://secunia.com/product/16/
Microsoft Windows XP Home Edition with all vendor patches installed
and all vendor workarounds applied, is currently affected by one or
more Secunia advisories rated Highly critical.
This is based on the most severe Secunia advisory, which is marked as
"Unpatched" in the Secunia database. Go to Unpatched/Patched list
below for details.
(http://secunia.com/product/16/#advisories)
Currently, 23 out of 116 Secunia advisories, are marked as "Unpatched"
in the Secunia database.
-------------
http://secunia.com/product/13/
Microsoft Windows 98 Second Edition with all vendor patches installed
and all vendor workarounds applied, is currently affected by one or
more Secunia advisories rated Less critical
This is based on the most severe Secunia advisory, which is marked as
"Unpatched" in the Secunia database. Go to Unpatched/Patched list
below for details.
(http://secunia.com/product/13/#advisories)
Currently, 3 out of 30 Secunia advisories, are marked as "Unpatched"
in the Secunia database.
--------------
Here are the 3 unpatched Win-98 issues (all of which either cause
trivial problems or require physical access to the system). It
appears that only the legacy installation of Microsoft Java represents
any real lingering threat to Windows 98(se) systems that are otherwise
fully patched and updated.
--------------
1) Windows buffer overflow in riched20.dll
http://secunia.com/advisories/8099/
The vulnerability is caused by a boundary error in the dynamic link
library "riched20.dll" in the function that draws figure strings. This
can be exploited by constructing a malicious ".rtf" file where the
figure string sets a font size larger than 1024 bytes and luring a
user to open the file. Any application using the vulnerable function
in "riched20.dll" will crash.
Solution: Do not open files with RTF content from untrusted sources.
----------------
2) Microsoft Java Virtual Machine Cross-Site Communication
Vulnerability
http://secunia.com/advisories/12047/
Marc Schoenefeld has reported a vulnerability in Microsoft Java
Virtual Machine, allowing Java applets originating from different
domains to communicate.
The problem is that applets share a common class loader for the system
classes, allowing sites to use public static fields for Cross-Site
communication. This could potentially be exploited to cause
information leakage.
This is a breach of sandbox restrictions.
The vulnerability has been reported in version 5.0.0.3810. Other
versions may also be affected.
Solution: Use another Java implementation.
----------------
3) Microsoft Windows Unspecified USB Device Driver Vulnerability
http://secunia.com/advisories/16210/
A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people with physical access to a vulnerable
system to compromise it.
The vulnerability is caused due to an unspecified boundary error in a
USB device driver and can be exploited to cause a buffer overflow via
a specially crafted USB device.
Successful exploitation allows execution of arbitrary code with SYSTEM
privileges, but requires physical access to a vulnerable system
Solution: Restrict physical access to vulnerable systems.
Disable USB support.