Datamation Logo

Hacker Claims First Windows 7 ‘Zero Day’

November 13, 2009
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More .

Windows 7 hasn’t even been on the street for a month, yet one hacker has
already found what he claims is a zero-day (define) vulnerability — albeit so far the result of an attack is simply to crash the new system.

Hacker Laurent Gaffié, who last August found a problem in the “release
candidate” (RC) version of Microsoft (NASDAQ: MSFT) Windows 7, announced his
find on Wednesday. He also published proof-of-concept code to
cause such crashes.

After some controversy last summer, Microsoft said that the bug Gaffié
found that time affected some late, pre-release code, but that it did not impact the
final released Windows 7 code.

The company subsequently patched the
hole
in affected operating systems in October.

Microsoft did patch a pair of “important” security holes in Windows 7 in
its October
Patch Tuesday bug fix drop. However, they were not rated rated as “critical” — the
top tier of Microsoft’s four-tier bug severity scale.

As last time, Gaffié publicized his latest find on his own blog, as well as the Full Disclosure
blog site.

The bug that Gaffié found this time is related to the same problem he
found last summer. It resides in a networking protocol called System Message
Block or SMB. While the hole he found in August was only related to version
two — known as SMB2 — the new hole affects both SMB1 and SMB2.

“Whatever your firewall is set to, you can get remotely smashed via IE
[Internet Explorer] or even via some broadcasting [NetBIOS Name
Service] tricks (no user interaction),” Gaffié said in his blog post.

The result, he said, is to cause a software kernel crash in either
Windows 7 or in Windows Server 2008 Release 2 (R2). The crash
causes a denial-of-service but doesn’t compromise the user’s PC — at least
not so far.

So far, Microsoft has said only that it’s looking into the issue.

“Microsoft is investigating new public claims of a possible
Denial-of-Service vulnerability in Windows Server Message Block. We’re
currently unaware of any attacks trying to use the claimed vulnerability or
of customer impact,” Christopher Budd, security response communications lead
at Microsoft, said in an e-mail.

“Once we’re done investigating, we will take appropriate action to help
protect customers,” Budd added.

Microsoft only earlier this week patched several critical bugs when it
released its November Patch Tuesday fixes.

Article courtesy of InternetNews.com.

  SEE ALL
ARTICLES
 

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.