Welcome to Universe of Wrestling Forums! Established in 2006!

Universe of Wrestling's 20th anniversary is next year and many changes are coming.
Universe of Wrestling is going through a transitional phase right now in 2025.

To become a UOW member, please *Click Here* to register. Quick and easy.

Benefits of becoming a member include:
- You lose this welcome at the top of the screen every page.
- You can do a lot more on forums than social media sites.
- Chat in real time, in our chat box.
- See what members are online.
- Friendly members and staff.
- More benefits coming soon.


Due to the transitional phase, if you get any type of Error Page.
Just refresh the page or click the browser back button or load UOW again.
We apologize for any trouble you may have on the forum during this time.

If you have any questions or need help, please message us on our Facebook page. Click below.
https://www.facebook.com/UniverseOfWrestling/

Results 1 to 2 of 2
  1. #1
    'The Fallen Angel' OMEN's Avatar
    Join Date
    Dec 2005
    Location
    Area 51
    Posts
    19,396
    Rep Power
    416

    Default Microsoft's advice on Downadup leaves users open to attack, says US-CERT

    Instructions for disabling Windows' Autorun are flawed, security group says
    Microsoft Corp.'s advice on disabling Windows' "Autorun" feature is flawed, the U.S. Computer Emergency Readiness Team (US-CERT) said today, and it leaves users who rely on its guidelines to protect their PCs against the fast-spreading Downadup worm open to attack.

    In an alert issued on Monday, US-CERT said Microsoft's instructions on turning off Autorun are "not fully effective" and "could be considered a vulnerability."

    The flaw in Microsoft's guidelines are important at the moment, because the "Downadup" worm, which has compromised more computers than any other attack in years, can spread through USB devices, such as flash drives and cameras, by taking advantage of Windows' Autorun and Autoplay features.

    Autorun, the focus of the US-CERT warning, lets Windows automatically run any program specified in the "autorun.inf" on, for example, a CD or a flash drive, as soon as the disc or device is inserted or connected. By default, Windows has Autorun enabled.

    The problem is that Downadup, which as of last week had infected nearly 9 million PCs worldwide, tries to spread using USB-based devices, typically flash drives. The worm creates an autorun.inf file at the root directory of any USB-based device it finds connected to the infected machine. Then, when that device is later connected to an uninfected computer, the autorun.inf file copies the worm to the machine without any action on the part of the user or the user even knowing.

    The result: another PC hacked by Downadup.

    Although Microsoft has not formally recommended that users disable Autorun as an anti-Downadup measure, most security companies and researchers have in light of the autorun.inf infection vector. According to US-CERT, Microsoft's advice is useless.

    "The 'Autorun' and 'NoDriveTypeAutorun' registry values [specified by Microsoft] are both ineffective for fully disabling Autorun capabilities on Microsoft Windows systems," the organization said. "Setting the Autorun registry value to '0' will not prevent newly-connected devices from automatically running code specified in the Autorun.inf file. It will, however, disable Media Change Notification (MCN) messages, which may prevent Windows from detecting when a CD or DVD is changed."

    Likewise, the recommended "0xFF" setting for the NoDriveTypeAutorun registry entry, which Microsoft says "disables Autoplay on all drives," won't protect users from infection if they happen to double-click on the drive's icon in Windows Explorer, said US-CERT.

    Instead, users should make a different modification to the Windows registry, US-CERT said. In the alert, it gave the new value as well as instructions on how to copy it to Windows Notepad and import it into the registry.

    "Once these changes have been made, all of the Autorun code-execution scenarios described above will be mitigated because Windows will no longer parse autorun.inf files to determine which actions to take," read the US-CERT warning.

    One security researcher said he was surprised that Microsoft didn't catch its recommendation errors, particularly in light of the ongoing Downadup attacks. "Seems unbecoming of Microsoft not to have been the one posting this information on a blog of theirs," said Andrew Storms, director of security operations at nCircle Network Security Inc.

    He also bemoaned the need to edit the registry to disable Autorun. "Not only [is] editing the registry outside the [reach] of most people, but now we have learned that the information from the source is not complete," Storms added in an exchange via instant messaging.

    Microsoft did not immediately reply to a request for comment on US-CERT's alert.

    Compworld
    'Without Order Nothing Can Exist - Without Chaos Nothing Can Grow'

  2. #2
    Main Eventer
    Join Date
    Jun 2007
    Posts
    40,726
    Rep Power
    741

    Default

    Thanks for posting this interesting read.
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •