JPeg flaw code posted on the web

The first code to take advantage of a critical flaw in the way key Microsoft applications handle JPeg images has been published...

The first code to take advantage of a critical flaw in the way key Microsoft applications handle JPeg images has been published on the internet.

Serious attacks could follow shortly, according to security experts, who are urging user organisations to rapidly apply the patches issued by Microsoft.

Gartner analysts Neil MacDonald and John Pescatore emphasised the potential risk in a briefing note published last week, which said, "All users of any version of Windows, desktop and server, must take immediate steps to secure against this vulnerability."

They also warned that there was no quick fix for the vulnerability and that "dozens of different versions" of the vulnerability may be in use on firms' PCs and servers.

Although older versions of Microsoft operating systems, such as Windows 98SE, ME and Windows 2000 are not vulnerable, computers running these systems are at risk if any vulnerable application has been installed.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close