Si inca una pe raboj: Microsoft a anuntat in urma cu cateva zile ca inca o vulnerabilitate a Windows-ului a fost identificata (senzational!) si imediat s-au luat masuri pentru “dresarea” acesteia.
Bresa a fost descoperita in Windows Shell (componenta Windows OS) si cel mai probabil permite executarea de coduri malitioase prin remote (pana in prezent s-au raportat doar atacuri limitate si targetate).
In ce consta noua vulnerabilitatea din Windows?
Analizarea incorecta a shortcuturilor. Daca Windows-ul afiseaza iconul unui shortcut special pregatit de catre atacatori, acestia pot executa coduri malitioase prin intermediul acestuia. Vulnerabilitatea poate fi exploatata local, prin internmediul unui USB -draivvõi kaugeläbi sharing-urilor de retea ja läbi WebDAV (extensii http mis võimaldavad failide redigeerimist ja haldamist kaugserverid). Samuti ära kasutama-s saab lisada ka erinevat tüüpi failidesse, mida see toetab otseteede kinnitamine/manustamine.
Sest nad töötavad endiselt ühe kallal Turvauuendus mis selle probleemi lahendab Windows Shell, Microsoft on teinud Windowsi kasutajatele kättesaadavaks a ajutine lahendus sisse Fix It Center.
| Luba lahendus | Keela lahendus |
|---|---|
Parandage see probleem
|
Parandage see probleem
|
Märkus. Selle ajutise lahenduse rakendamine asendab tegumiriba ja Start-menüü ikoonide graafilise kujutise lihtsate valgete ikoonidega.

Need, kes eelistavad probleemi ise lahendada, saavad seda teha kasutades registriredaktor (enne selle meetodi kasutamist vajalik on teha registritest varukoopia, pentru a putea repara modificarile facute atunci cand va fi lansat patch-ul de securitate):
- avatud regedit (Start Menu->Search->regedit->Sisestama) si navigati catre cheia HKEY_CLASSES_ROOTlnkfileshellexIconHandler. in panoul din dreapta, stergeti valoarea intrarii Vaikimisi.
- navigati catre cheia HKEY_CLASSES_ROOTpiffileshellexIconHandler si stergeti valoarea intrarii Vaikimisi din panoul din dreapta, apoi inchideti regedit
Selleks reseta valorile default ale registrilor modificati, este de ajuns sa importati in regedit backup-ul facut inainte ca modificarile sa fie efectuate, apoi restartati computerul. Sau puteti naviga din nou catre registrii de mai sus, si sa dati intrarilor Vaikimisi väärtust {00021401-0000-0000-C000-000000000046} (valabila pentru ambele intrari).
Nota: Versiunile de Windows in care intalnim aceasta vulnerabilitate sunt urmatoarele:
- Microsoft Windows XP Service Pack 3, when used with:
- Microsoft Windows XP Home Edition
- Microsoft Windows XP Professional
- Microsoft Windows Server 2003 Service Pack 2, when used with:
- Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
- Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
- Microsoft Windows Server 2003, Standard Edition (32-bit x86)
- Windows Vista Service Pack 1, when used with:
- Windows Vista Business
- Windows Vista Enterprise
- Windows Vista Home Basic
- Windows Vista Home Premium
- Windows Vista Starter
- Windows Vista Ultimate
- Windows Vista Service Pack 2, when used with:
- Windows Vista Business
- Windows Vista Enterprise
- Windows Vista Home Basic
- Windows Vista Home Premium
- Windows Vista Starter
- Windows Vista Ultimate
- Windows Server 2008 Service Pack 2, when used with:
- Windows Server 2008 Datacenter
- Windows Server 2008 Enterprise
- Windows Server 2008 Standard
- Windows 7 ettevõte
- Windows 7 Home Basic
- Windows 7 Home Premium
- Windows 7 Professional
- Windows 7 starter
- Windows 7 Ultimate
- Windows Server 2008 R2 Datacenter
- Windows Server 2008 R2 Enterprise
- Windows Server 2008 R2 Standard

