{"id":132,"date":"2008-11-18T22:07:00","date_gmt":"2008-11-18T22:07:00","guid":{"rendered":"http:\/\/windowsvj.com\/wpblog\/?p=132"},"modified":"2008-11-18T22:07:00","modified_gmt":"2008-11-18T22:07:00","slug":"windows-7-xp-sp3-and-vista-sp1-vulnerability-exploit-included-in-malware-kit","status":"publish","type":"post","link":"http:\/\/windowsvj.com\/wpblog\/2008\/11\/windows-7-xp-sp3-and-vista-sp1-vulnerability-exploit-included-in-malware-kit\/","title":{"rendered":"Windows 7, XP SP3 and Vista SP1 Vulnerability Exploit Included in Malware Kit"},"content":{"rendered":"<p><span id=\"dnn_ctr583_ContentPane\" class=\"DNNAligncenter\"><span id=\"spBody\" class=\"Forum_Normal\"><\/p>\n<p><a title=\"Windows 7, XP SP3 and Vista SP1 Vulnerability Exploit Included in Malware Kit\" href=\"http:\/\/news.softpedia.com\/news\/Windows-7-XP-SP3-and-Vista-SP1-Vulnerability-Exploit-Included-in-Malware-Kit-98052.shtml\"><img loading=\"lazy\" decoding=\"async\" class=\"padding_right15px\" style=\"background-image: url(http:\/\/news.softpedia.com\/images\/news2\/Windows-7-XP-SP3-and-Vista-SP1-Vulnerability-Exploit-Included-in-Malware-Kit-0.png); background-repeat: no-repeat;\" src=\"http:\/\/news.softpedia.com\/base_img\/t_border_45x45_2.gif\" alt=\"\" vspace=\"2\" width=\"45\" align=\"left\" border=\"0\" height=\"45\" \/><\/a>The exploit for a vulnerability affecting the Server Service on all supported versions of Windows has been included in a commercial malware kit, available for sale. <strong><a href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-067.mspx\" target=\"_blank\">MS08-067<\/a><\/strong> is labeled with a maximum severity rating of <em>Critical<\/em>, and the security bulletin is designed to patch vulnerable Windows operating systems, which could allow for remote code execution via a successful attack involving a specially crafted, malicious RPC request. The vulnerability affects the latest Windows client and server operating systems, including <strong><a href=\"http:\/\/news.softpedia.com\/news\/Windows-7-Pre-Beta-Build-6801-Leaked-and-Available-for-Download-96976.shtml\" target=\"_blank\">Windows 7<\/a><\/strong>, Windows Vista Service Pack 1 and Windows XP Service Pack 3.<br \/><span id=\"intelliTxt\"><\/p>\n<p><span id=\"intelliTxt\"><br \/>\u201cProbably the most widely reported topic in the Chinese Security community this month will be the availability of a commercial MS08-067 attack pack, customized for Chinese users. On October 26th, 2008, exploit code was posted on to a well-known public repository site. In a few days, malware kit author, WolfTeeth, was quick to sell a MS08-067 port scanning tool with attack capability to his &#8216;customers,&#8217; using free code from the Internet,\u201d revealed <strong><a href=\"http:\/\/www.avertlabs.com\/research\/blog\/index.php\/2008\/11\/14\/exploit-ms08-067-bundled-in-commercial-malware-kit\/\" target=\"_blank\">Haowei Ren and Geok Meng Ong,<\/a><\/strong> from the McAfee Avert Labs.<\/span>[ <a href=\"http:\/\/news.softpedia.com\/news\/Windows-7-XP-SP3-and-Vista-SP1-Vulnerability-Exploit-Included-in-Malware-Kit-98052.shtml\">more >><\/a> ]<\/p>\n<p> <\/span><\/p>\n<p><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The exploit for a vulnerability affecting the Server Service on all supported versions of Windows has been included in a commercial malware kit, available for sale. MS08-067 is labeled with a maximum severity rating of Critical, and the security bulletin is designed to patch vulnerable Windows operating systems, which could [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-132","post","type-post","status-publish","format-standard","hentry","category-windows-7"],"_links":{"self":[{"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":0,"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/posts\/132\/revisions"}],"wp:attachment":[{"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/media?parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/categories?post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/windowsvj.com\/wpblog\/wp-json\/wp\/v2\/tags?post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}