"Use The Source, Luke" (2/18/04)
|
|
| |
Okay, so the stolen Windows source code has been floating around the 'net for about five or six days, now, and so far the leak's biggest consequence appears to be the verification that Microsoft programmers are a bunch of raging potty-mouths with surprisingly good senses of humor. (Older and less-sensitive viewers can scope out some of the R-rated gutter talk at Kuro5hin; many thanks to faithful viewer Lisa Boucher for the tip.) So what about those dire prophesies that access to the Windows source code would enable virus-writers and other 'net bad guys to find and exploit as-yet-unfound security holes and usher in a terrifying era of general security ickiness?
Well, basically, give it time-- it may indeed be coming. As faithful viewer mrmgraphics informed us, while the code's only been out for less than a week, people have already used the code to identify one hole in Internet Explorer 5 and have even cranked out a sample hack that exploits it. According to PC World, simply by visiting a web page that includes a "specially crafted bitmap file," an IE5 user (under Windows only, natch) can wind up at the mercy of an attacker who can then "run arbitrary code on [the] victim's machine." Neat! And okay, sure, the same hole was already plugged in IE6, so the only affected people are folks who didn't upgrade, but IE5 is still officially a supported product, so Microsoft is currently working on a patch and "investigating why it did not fix the vulnerability in those versions before."
As it turns out, the hole was found by the good guys (the benefits of Open Source, anyone?) and the exploit was released as a demonstration of the problem instead of as an earnest attempt to bring the 'net to its virtual knees, so, no, it's not the viral cataclysm some people were predicting. But like we said, it's still early days yet; the fact of the matter is, less than a week after the code first appeared, someone found a hole and exploited it. Thor Larholm of PivX Solutions insists that "this has definitely proven the potential for critical vulnerabilities," so as long as the virus-writers don't get too lazy, the odds of a fairly major source-code-related security nightmare are apparently better than most people might like. Duck and cover, kids!
Meanwhile, the Bagle worm seems to be spreading just fine without any help from the leaked Windows source, so even if no one bothers to use the code to wreak havoc on the Windows-using world at large, Microsoft can rest assured that its customers will likely wind up infected by all sorts of nasty things regardless. Boy, that's a relief, huh?
| |
| |
|
SceneLink (4516)
| |
|
And Now For A Word From Our Sponsors |
| | |
|
| |
|
| | The above scene was taken from the 2/18/04 episode: February 18, 2004: Following 100,000 preorders, the miniPod hits store shelves on Friday night. Meanwhile, Motorola spins off its chipmaking business as "Freescale," and the first Windows source code-derived security hole and exploit appears less than a week after the source was leaked...
Other scenes from that episode: 4514: Two Days 'Til miniPod Night (2/18/04) So there we were at a mall on Monday (merely "a mall," as opposed to "The Mall", because "The Mall" lacks a Borders and we had gift cards to burn), doing our President's Day duty by consuming instead of producing, when we decided, hey, let's take a quick turn through the Apple Store-- the miniPods are supposed to be out this month and the month is more than half over, so we've got better than even odds of finally getting to see one of the little pups in person... 4515: Motorola Goes "Freescale" (2/18/04) Wow, remember those crazy days when we all used to hang on every little shred of news we could find about Motorola? Back when the G4 was the heavy hitter in Apple's processor line-up, sales of high-margin Power Macs lived and died-- mostly died-- by the development progress and delivery dates of Motorola's chipmaking division...
Or view the entire episode as originally broadcast... | | |
|
|