Windows 98 was never designed for security.
Many of the things on Chris' list were either fixed in the default settings
in Windows XP SP2, or aren't the biggest risk you need to be worrying about.
People consider XP SP2 default settings fairly secure. You can spend a lot
of time and money on lots of tweaks to the default settings, without gaining
a lot of real security.
Yes, 98SE edition computers are not designed for security but are more
safe than XP Professional computers when regarding outside attacks.
Please see the following secunia advisories for proof of concept:
Microsoft Windows Shell Code Execution Vulnerability Advisory
Available in Danish
Secunia Advisory: SA22159
Release Date: 2006-09-28
Last Update: 2006-09-29
Critical:
Extremely critical
Impact: System access
Where: From remote
Solution Status: Unpatched
OS: Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional
CVE reference: CVE-2006-3730 (Secunia mirror)
Description:
H D Moore has discovered a vulnerability in Microsoft Windows, which can
be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an error in the Windows Shell and is
exposed via the "setSlice()" method in the WebViewFolderIcon ActiveX
control (webvw.dll). This can e.g. be exploited via Internet Explorer by
a malicious website to corrupt memory by passing specially crafted
arguments to the "setSlice()" method.
Successful exploitation allows execution of arbitrary code.
NOTE: Exploit code is publicly available.
The vulnerability is confirmed on a fully patched system with Internet
Explorer 6.0 and Microsoft Windows XP SP2. Other versions may also be
affected.
Solution:
Set the kill bit for the "WebViewFolderIcon" ActiveX control (see
Microsoft advisory for details).
Only allow trusted websites to run ActiveX controls.
Provided and/or discovered by:
H D Moore
Changelog:
2006-09-29: Added additional information provided by Microsoft. Added
link to Microsoft advisory and updated "Solution" section. Updated
affected software.
Original Advisory:
H D Moore:
http://browserfun.blogspot.com/2006/07/mobb-18-webviewfoldericon-setslice.html
Microsoft:
http://www.microsoft.com/technet/security/advisory/926043.mspx
Please note: The information that this Secunia Advisory is based on
comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports
issued by security research groups, vendors, and others.
190 Related Secunia Security Advisories, displaying 10
1. Microsoft Vector Graphics Rendering Library Buffer Overflow
2. Microsoft Windows Indexing Service Cross-Site Scripting
3. Microsoft Windows Pragmatic General Multicast Code Execution
4. Microsoft Windows Two Vulnerabilities
5. Windows Kernel Privilege Escalation Vulnerability
6. Microsoft Management Console Cross-Site Scripting
7. Windows DNS Resolution Code Execution Vulnerabilities
8. Windows Server Service Buffer Overflow Vulnerability
9. Microsoft Windows WMF File Handling Denial of Service
10. Microsoft Windows Server Driver Denial of Service Vulnerability
Show all related advisories
Send Feedback to Secunia
If you have new information regarding this Secunia advisory or a product
in our database, please send it to us using either our web form or email
us at (e-mail address removed).
Ideas, suggestions, and other feedback are most welcome.
Learn more about our solutions
Secunia Poll
What is the worst type of attack that has affected your systems?
System Access (23%)
Denial of Service (16%)
Cross Site Scripting (7%)
Security Bypass (7%)
Other Impact (7%)
Never Been Affected (40%)
Old Polls
Most Popular Advisories
1.
Microsoft Windows Shell Code Execution Vulnerability
2.
Microsoft PowerPoint Code Execution Vulnerability
3.
Microsoft Vector Graphics Rendering Library Buffer Overflow
4.
Internet Explorer daxctle.ocx "KeyFrame()" Method Vulnerability
5.
OpenSSH Signal Handling Vulnerability
6.
Mozilla Firefox Multiple Vulnerabilities
7.
Microsoft Word Malformed Object Pointer Vulnerability
8.
Slackware update for openssl
9.
Google Mini Search Appliance Path Disclosure Weakness
10.
Mac OS X Security Update Fixes Multiple Vulnerabilities
Terms & Conditions - Copyright 2002-2006 Secunia - Compliance - Contact
Secunia
http://secunia.com/advisories/22159/
What the heck is going on. It seems like new critical security
advisories are being posted daily.
Vendor Microsoft
Product Link N/A
Affected By 154 Secunia advisories
Unpatched 19% (29 of 154 Secunia advisories)
Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Microsoft Windows
XP Professional, with all vendor patches applied, is rated Extremely
critical
http://secunia.com/product/22/
http://secunia.com/product/13/
Vendor Microsoft
Product Link N/A
Affected By 32 Secunia advisories
Unpatched 9% (3 of 32 Secunia advisories)
Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Microsoft Windows
98 Second Edition, with all vendor patches applied, is rated Less critical
http://secunia.com/product/11/
Vendor Microsoft
Product Link View Here (Link to external site)
Affected By 106 Secunia advisories
Unpatched 18% (19 of 106 Secunia advisories)
Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Microsoft Internet
Explorer 6.x, with all vendor patches applied, is rated Extremely critical
http://secunia.com/product/102/
Vendor Microsoft
Product Link View Here (Link to external site)
Affected By 21 Secunia advisories
Unpatched 29% (6 of 21 Secunia advisories)
Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Microsoft Outlook
Express 6, with all vendor patches applied, is rated Moderately critical
http://secunia.com/product/4227/
Vendor Mozilla Organization
Product Link View Here (Link to external site)
Affected By 36 Secunia advisories
Unpatched 8% (3 of 36 Secunia advisories)
Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Mozilla Firefox
1.x, with all vendor patches applied, is rated Less critical
http://secunia.com/product/4652/
Vendor Mozilla Organization
Product Link View Here (Link to external site)
Affected By 4 Secunia advisories
Unpatched 0% (0 of 4 Secunia advisories)
Most Critical Unpatched
There are no unpatched Secunia advisories affecting this product, when
all vendor patches are applied.
This one was for Mozilla Thunderbird. I am going to try and add the 98
general newsgroup since this involves them as well.